Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice

Similar documents
Information Hiding in H.264 Compressed Video

Watermarking patient data in encrypted medical images

JPEG Image Transmission over Rayleigh Fading Channel with Unequal Error Protection

Efficient Bit-Plane Coding Scheme for Fine Granular Scalable Video Coding

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Fast Mode Decision using Global Disparity Vector for Multiview Video Coding

Contrast Enhancement Based Reversible Image Data Hiding

Power-Distortion Optimized Mode Selection for Transmission of VBR Videos in CDMA Systems

A new quad-tree segmented image compression scheme using histogram analysis and pattern matching

Local prediction based reversible watermarking framework for digital videos

Comprehensive scheme for subpixel variable block-size motion estimation

Video Encoder Optimization for Efficient Video Analysis in Resource-limited Systems

Lossless Image Watermarking for HDR Images Using Tone Mapping

A New Compression Method for Encrypted Images

Implementation of CAVLD Architecture Using Binary Tree Structures and Data Hiding for H.264/AVC Using CAVLC & Exp-Golomb Codeword Substitution

2. REVIEW OF LITERATURE

Digital Watermarking Using Homogeneity in Image

H.264 Video with Hierarchical QAM

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

DELAY-POWER-RATE-DISTORTION MODEL FOR H.264 VIDEO CODING

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach

MLP for Adaptive Postprocessing Block-Coded Images

Practical Content-Adaptive Subsampling for Image and Video Compression

Bit-depth scalable video coding with new interlayer

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

A Reversible Data Hiding Scheme Based on Prediction Difference

MOTION estimation plays an important role in video

Journal of mathematics and computer science 11 (2014),

UNEQUAL ERROR PROTECTION FOR DATA PARTITIONED H.264/AVC VIDEO STREAMING WITH RAPTOR AND RANDOM LINEAR CODES FOR DVB-H NETWORKS

Performance Evaluation of the MPE-iFEC Sliding RS Encoding for DVB-H Streaming Services

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

American International Journal of Research in Science, Technology, Engineering & Mathematics

Robust Wireless Video Transmission Employing Byte-aligned Variable-length Turbo Code

Dct Based Image Transmission Using Maximum Power Adaptation Algorithm Over Wireless Channel using Labview

Analysis on Color Filter Array Image Compression Methods

A Maximum Likelihood Approach to Video Error Correction Applied to H.264 Decoding

Distributed Source Coding: A New Paradigm for Wireless Video?

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

ABSTRACT. We investigate joint source-channel coding for transmission of video over time-varying channels. We assume that the

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

FUZZY JOINT ENCODING AND STATISTICAL MULTIPLEXING OF MULTIPLE VIDEO SOURCES WITH INDEPENDENT QUALITY OF SERVICES FOR STREAMING OVER DVB-H

Power-Aware Rate Control for Mobile Multimedia Communications

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

OVER THE REAL-TIME SELECTIVE ENCRYPTION OF AVS VIDEO CODING STANDARD

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Exploiting "Approximate Communication" for Mobile Media Applications

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

UNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS. Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

A High Definition Motion JPEG Encoder Based on Epuma Platform

Image Steganography using Sudoku Puzzle for Secured Data Transmission

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 5, MAY

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel

Decision Based Median Filter Algorithm Using Resource Optimized FPGA to Extract Impulse Noise

Blur Estimation for Barcode Recognition in Out-of-Focus Images

Spatio-temporal error concealment technique for high order multiple description coding schemes including subjective assessment

Image Compression Supported By Encryption Using Unitary Transform

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression

Information representation

Compression and Image Formats

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

H.264-Based Resolution, SNR and Temporal Scalable Video Transmission Systems

Low-Complexity Bayer-Pattern Video Compression using Distributed Video Coding

Data and Computer Communications

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Analysis of Secure Text Embedding using Steganography

MULTIMEDIA PROCESSING PROJECT REPORT

Subjective evaluation of image color damage based on JPEG compression

A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES

ECE/OPTI533 Digital Image Processing class notes 288 Dr. Robert A. Schowengerdt 2003

GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE

IMAGE AND VIDEO TRANSMISSION OVER WIRELESS CHANNEL: A SUBBAND MODULATION APPROACH

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

An Enhanced Least Significant Bit Steganography Technique

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression

A Near Optimal Deblocking Filter for H.264 Advanced Video Coding

Chapter-1: Introduction

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels

Adaptive Digital Video Transmission with STBC over Rayleigh Fading Channels

Unit 1.1: Information representation

UEP based on Proximity Pilot Subcarriers with QAM in OFDM

Assistant Lecturer Sama S. Samaan

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

THE DEMAND for wireless packet-data applications

Direct Binary Search Based Algorithms for Image Hiding

Artifacts Reduced Interpolation Method for Single-Sensor Imaging System

Direction-Adaptive Partitioned Block Transform for Color Image Coding

Weighted-prediction-based color gamut scalability extension for the H.265/HEVC video codec

Meta-data based secret image sharing application for different sized biomedical

Fast Inverse Halftoning Algorithm for Ordered Dithered Images

Image Encryption Algorithm based on Chaos Mapping and the Sequence Transformation

Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold

A Reversible Data Hiding Method with Contrast Enhancement for Medical Images by Preserving Authenticity

Analysis and Improvement of Image Quality in De-Blocked Images

Transcription:

20 Sixth International Conference on Image and Graphics Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice Jiajia Xu,Weiming Zhang,Nenghai Yu,Feng Zhu,Biao Chen MOE-Microsoft Key aboratory of Multimedia Computing and Communication University of Science and Technology of China Hefei 230026,P.R. China {xujiajia, zhufengx, chb893}@mail.ustc.edu.cn; zwmshu@gmail.com; ynh@ustc.edu.cn Abstract Compressed video streams are sensitive to errors and losses when transmitted over wireless error-prone channels. In this paper, we propose an Error Resilient (ER) scheme based on Reversible Data Hiding (RDH) and Redundant Slice (RDH-RS). Reversible data hiding is quite effective in unequal protection and can provide satisfactory protection to vital information, while redundant slice works well in protecting mass important data. Our scheme exploits both advantages. At the encoder side, we apply RS protection to odd frames, and embed vital data, the motion vectors (MV) of even frames, into the redundant slice of odd frames by bidirectional-rdh method, thus providing protection to even frames. If an MV of an odd frame cannot be correctly decoded at the decoder side, the redundant slice of odd frame will be utilized for error concealment. If the lost MV belong to an even frame s macroblock (MB), then the MV will be retrieved from the redundant slice of prior odd frame and help restoration. As our data hiding method is reversible, no extra visual quality degradation will happen, and the computational burden is quite low. Experimental results demonstrate that RDH-RS method can provide much better protection to fragile compressed video when compared with the previous arts. Keywords-Error resilient;reversible Data Hiding;Redundant Slice; Error concealment I. INTRODUCTION H.264/AVC video coding standard is designed by ITU-T Video Coding Experts Group and ISO/IEC Moving Pictures Experts Group, and its purpose is to achieve high compression ratio as well as satisfactory visual quality by reducing the spatial and temporal redundancy. The sensitivity of video bit streams to errors lead to the fact that video visual quality will suffer from serious degradation when transmitted over wireless error-prone channel. Common degradations include transmission packet loss and transmission error caused by fading in wireless channels[3]. To handle these problems and enhance the robustness of video bit streams to errors, researchers have proposed many error resilience (ER) and error concealment (EC) techniques [-4,6] in the past decades. Error resilience techniques follow the idea of error correction coding, and add some redundant information into the bit streams at the encoder side in Fig.. For example, H.264 has incorporated Redundant Slice (RS) technique. Important region of a picture will be encoded twice, so if the primary slice is contaminated during transmission and cannot be correctly decoded, the redundant slice will be helpful. The basic idea of ER is to enhance the robustness of compressed bit streams against packet loss and error, with the cost of reduced coding efficiency [3][4][6].Error concealment techniques handle the problem in another way. No redundant information is added into the bit streams at the encoder side. After receiving the bit streams, the decoder try to reconstruct the image sequence. If an error is found, the decoder will try to conceal the error. For example, if a block cannot be correctly decoded, it can be estimated by its neighboring blocks(the neighboring blocks should be correctly decoded, of course). The estimation will lead to blur, but large area of error is avoided. Generally, error concealment is the last shield, but obviously, its protection is quite limited. Primary protection should be undertaken by error resilient coding. Fig. bit streams over wireless error-prone channels Many error resilient methods have been proposed since it was first introduced. Most methods add parity information, or another copy of important regions, to the bit streams. Recently, a new idea of combing error resilient coding and data hiding emerged. Chen and eung [] proposed a data hiding based (DHbased) method for video error concealment, which has little computation cost at the decoder side. In their method, motion estimation is first implemented between two consecutive I- frames, and the motion vectors, as the redundant information, are embedded into quantized DCT (QDCT) coefficients. At the decoder side, the embedded motion vectors are extracted and they can help exactly find the reference MBs and recover the corrupted MBs. However, the data hiding process changed the quantized DCT coefficients permanently, and this leads to extra visual quality degradation. Chung et al[2] improves their method by using reversible data hiding. In their method, first increase positive QDCT coefficients by one, if the scanned bit of MV is zero, the corresponding zero QDCT coefficient remains its value. Otherwise, the corresponding zero QDCT coefficient is changed to one[2]. However, we should realize that the capacity of DHbased method is restricted, which leads to limited protection. Generally speaking, this approach is used to protect the emphasis information such as Synchronization information and MVs etc.as for redundant slices technique in H.264/AVC, which protect the frame information equally. However, there are two drawbacks of this method. First it ignores the priority of important regions; second, the size of bit streams increases significantly. This observation inspires 978-0-7695-454-7/ $26.00 20 IEEE DOI 0.09/ICIG.20.70 223

us to design a reversible data hiding (RDH) scheme to embed the MVs of primary slices into the MVs of front redundant slices. Compared with DH-based method, the proposed scheme can protect more information or regions. Compared with using only redundant slices, our method not only reduces bit streams size remarkably, but also has no influence on primary slices. Besides, the decode program reading MVs form Network Abstraction ayer (NA) is earlier than QDCT coefficients. Thus, our method is computational cheaper while embedding information into MVs of redundant slices at the decoder side, and it is suitable for environments that computation resources are limited. The paper is organized as follows. Section 2 describes the proposed Reversible Data Hiding and Redundant Slice (RDH-RS) error concealment algorithm using reversible data hiding and redundant slices. The simulations done using the proposed RDH-RS technique and the obtained results are presented in Section 3. In Section 4, conclusions are briefly drawn based on the results. II. REVERSIBE DATA HIDING AND REDUNDANT SICE (RDH-RS) METHOD In this section, the proposed scheme is described in five aspects as follows. A. Redundant Slice Scheme Redundant Slices is a new feature of H.264/AVC coding standard.a redundant slice is a coded additional representation of a primary slice. The parameters () used for encoding the redundant slices may differ from those used for the primary slices, but they should have no visual discrepancy between the two representations[5]. We set the redundant parameters as follow QPredundant = QPprimary + qp (). Redundant slices even do not have to cover the entire region represented by the primary pictures. At the decoder side, when the primary slices are lost or cannot be correctly decoded, redundant slices can be utilized to improve the decoded video quality. If the primary slices can be correctly decoded, the redundant slices will be abandoned. In this section, we design a new strategy to add redundant slice. If frame number is odd, it will generate a redundant slice. Otherwise, that is the frame number is even, it will not add redundant slice. As Fig.2 show, suppose that the number of current frame N is odd, and thus we will embed the MVs of N+ primary slice into the MVs of N redundant slice,and so on. Fig.2 RS location and embed idea B. Selection Motion vectors Obviously, if we embed all MVs information of primary into previous redundant slice, it will bring computational complexity and it s not necessary. Generally speaking, the motion object is usually locate at the center of the current frame as show in Fig3.This observation inspires us to select the MVs locate at the center as the protect information. A= Wreg Hreg / size( MB ) (2) Where A is total number of MBs. W reg,and H reg are,respectively, the width and length of selection regions. 0 2 Fig.3 face locate at the center of the frame In paper[],the motion vector is within the range of 5 pixels and its precision is half pixel. Consequently, the total number of the information bits to represent the MV of one MB is DH = 2 (log2 max(2 5) + ) = 2 (3) In our method, we modify DH to RDH _ RS as follow _ = 2 ( log 2(2 R + ) + ) + RDH RS range p (4) where R range is the search range, p and is using to check the Correctness of method,we set R =5,and p =. range is number of parity bit, RDH _ RS.In our C. Bidirectional-RDH method The selected MVs are converted into a binary sequence before we embedded it into the N-th redundant slice s MVs, denoted as: I = { b... b... b }, n n As shown in Fig.4, (a) is the Original MVs distribution, acted as the cover sequence. Fig.4 (b) shows the embedding process by modify the 0 -value of the cover sequence: Firstly, all the non-zero values of the cover are shifted one step away from the 0 -value, so the - and value positions are available for embedding. Secondly, if b n is 0, the 0 -value of the cover will keep unchanged. Otherwise the bn+ will be scanned: if bn b n+ =0, the 0 -value of the cover will be changed into ; if bn b n+ =, the 0 -value of the cover will be changed into -. More generally, if the modified value of the cover sequence extends similarly from 0 to -, and other non-zero values, as shown in Fig.4(c), the embedding capacity could be improved effectively. 224

(a) (c) Fig.4 show embedding process. (a)original MVs distribution.(b) Shift positive coefficients to right by one, and Shift negative to left by one, the cover sequence is 0. (c) the cover sequence is -,0,. Here, we summarize the general embedding formula as show in (5) and (6).The first, all larger than l -value MVs are shifted the right position by ( l + /2) Δ,while all smaller than l -value MVs are shifted to the left position by ( l + /2) Δ,where Δ denotes the shift step. Assuming the original MVs set of M-th MB in the N-th frame is F,and then F Frequency Δ (b) F + ( l+ /2) Δ F > l F l+ Δ F < l F otherwise (5). MVs = ( /2) Where, Δ denotes the shift step, lis the value of MV. For example, in the Fig.4(b) l=0, Δ =2,and in (c) l=, Δ =2. The process of embedding these information sequences into MVs is performed by F ( +Δ ) +Δ/ 2 l F l, bb = 0,, FNM ( +Δ) l FNM l, bn = 0 FNM, = F ( +Δ) Δ/ 2 l F l, bb = (6) F F > l, FNM, < l Up to now, the information sequence have been stored in F. D. Retrieval data for Concealment By extracting information sequence b n from MVs at the decoder side, we reconstruct the MVs. The retrieval process can be interpreted as bb = 0 FNM, = FNM, ( +Δ ) +Δ/ 2 b= 0 bn = FNM, = FNM, ( +Δ) bb + = = ( +Δ) Δ/ 2 n n F F (7), where l F l. bn is the information sequence retrieved at the decoder. Further, we can recover the original MVs,by performing F ( l+ /2) Δ FNM, > (3 l/2+ /2) Δ + ( + /2) Δ F F l F < (3 l/2+ /2) Δ = ( Δ (8), F + k )/(+ Δ) otherwise 2 Where bb = 0 k = 0 bn = 0 bb = Obviously, the perturbed MVs can be recovered completely by (7) and (8),as show in Fig.5. So our proposed bidirectional Reversible Data Hiding and Redundant Slice (RDH-RS) method for H.264/AVC has no quality degradation. Fig.5 using information for error concealment E. Capacity Analysis Now we discuss RDH-RS method capacity. As show in Fig.6, one MB may be portioned into 6x8, 8x6, 8x8.and 8x8 partition is further partitioned into partitions of 8x4, 4x8, or 4x4 samples. Fig.6 Segmentations of the MB and 8x8 partitions So capacity bound is W H size( MB) W H W H 2 mmint 2 mt i 2 mmaxt (9). size( MB) i= 0 size( MB) Where, W and H denotes the width and height of frame. size( MB) represents the size of one MB. m, m and m min respectively denotes the i-th MB divided into m blocks, Maximum number and Minimum number. t represents average embed bits per motion vector. So the Maximum bits of embedding into one 76 44 (352 288)frame can reach 782(728) bits.. i max 225

III. THE EXPERIMEN AND SOME ANAYSIS In this section, the proposed RDH-RS error resilient algorithms have been integrated into the Joint Model (JM) version 8.6 of H.264/AVC. We compare the performance between our proposed method and the RDH method proposed by Chung and Huang[2] for intra-frame error concealment in H.264/AVC sequences. We implemented these methods on the computer with Intel Pentium 4 CPU 3.00GHz and GB RAM. The program developing environment is Visual C++ 2008 based on Microsoft Windows XP operating system. The rtpdump project is used to implement the packet loss. In our experiment, we set A =6, Δ =2, l = etc. The frame GOP structure is set to IPPPP. Setting five different redundant slices quantization parameters QP 34, 38, 42, 46, and 50,are considered while redundant encoding the Redundant Slices. In order to analysis the relations between PSNR and bit rate increment of RDH method, we set encode parameters IntraPeriod = 6,7,8. TABE I. Video sequence TEST VIDEO SEQUENCES Size Foreman 76 44 Carphone 76 44 Silent 352 288 Mobile 352 288 Fig.7 Concealed results of Carphone sequence with 0% loss.(a)original.(b)recovered by RDH[2].(c) recovered by OUR method(rdh-rs). TABE II. PSNRS OF RECOVERED SEQUENCES FOR 0%OSS Video Sequences Methods Foreman Carphone Silent Mobile RDH[2] 43.59 42.98 36.99 34.79 RDH-RS 45.8 45.46 39. 35.50 We compare the performance of our algorithm to the RDH method [2].Tables2 presents the quantitative results. The proposed method is found to have better performance.figs.7 shows the Carphone sequences with a 20% loss. It can be seen through subjective inspection that the proposed method can achieve the better results.fig.8 shows the relations between PSNR and average bit rate increment. Compared with RDH[2] method, our scheme can get higher PSNR with less bit rate increment IV. CONCUSION In this paper, we introduce a new low complexity yet effective approach RDH-RS for error concealment. At the encoder side, the proposed method embeds MVs of primary into previous redundant slice by modify its MVs, and the corrupted MBs can be recovered completely. Compared with DH-based method, The proposed scheme can protect more information. Compared with using only redundant slices, our method not only reduces bit streams size remarkably, but also has no influence on primary slices. The proposed method reduce the computation burden at decoder.computer simulations show that our error concealment can be improved significantly in terms of both PSNR and subjective picture quality. ACKNOWEDGMENT This work is partially supported by the National Science Foundation of China (6093303), the National Science and Technology Major Project (200ZX03004-003), and the Fundamental Research Funds for the Central Universities(WK20023002, WK20020003). REFERENCES [] S. Chen and H. eung, A temporal approach for improving intraframe concealment performance in H.264/AVC, IEEE Trans. Circuits Syst. Video Technol., vol. 9, no. 3, pp. 422 426, Mar. 2009. [2] K.. Chung, Y.H. Huang, P.C. Chang, and H.Y. Mark iao, Reversible Data Hiding-Based Approach for Intra-Frame Error Concealment in H.264/AVC, IEEE Trans. Circuits Syst. Video Technol., vol. 20, no., pp. 643 647, November 200. [3] X. Qian, G. iu, and H. Wang. Recovering Connected Error Region Based on Adaptive Error Concealment Order Determination, IEEE Trans. Circuits Syst. Video Technol., vol., no. 4, pp. 683 696, June. 2009. [4] C. Zhu, Y.K. Wang, M. Hannuksela, H. i. Error Resilient Video Coding Using Redundant Pictures, IEEE Trans. Circuits Syst. Video Technol., vol. 9, no., pp. 3 426, January 2009. [5] DHEC and RDHEC [Online].Available: http://40.8.75.64/huang/iec.zip [6] S. Rane and B. Girod, Systematic lossy error protection of video based on H.264/AVC redundant slices, in Proc. Visual Communication and Image Processing VCIP-2006, San Jose, CA, Jan. 2005. [7] S. Wenger, "H.264/AVC over IP," IEEE Trans. Circuits Syst.Video Technol., vol. 3, no. 7, pp. 645 655, January 2003. [8] T. Stockhammer, M. M. Hannuksela, and T. Wiegand, H.264/AVC in Wireless Environments, vol. 3, no. 7, pp. 657 673, January 2003. [9] C.B. Adsumilli, M.C. Q. Farias, S.K. Mitra and M. Carli, A Robust Error Concealment Technique Using Data Hiding for Image and Video Transmission Over ossy Channels, IEEE Trans. Circuits Syst. Video Technol., vol. 5, no., pp. 394 406, November 2005. 226

46 45.5 Foreman under 0% loss RDH-RS RDH 46 44 carphone under 0% loss RDH-RS RDH 45 42 44.5 40 PSNR 44 PSNR 38 43.5 36 43 34 42.5 32 42.05..5.2.25.3.35.4.45 bit streams increase(%) 30 0.95.05..5.2.25.3.35 bit streams increase(%) Fig.8 Packet loss rate is 0%, the PSNR loss and the bit rate increment of RDH[2] and RDH-RS performance. (a)foreman.(b)carphone. 227