An error concealment algorithm in wireless networks

  • Wei Congying*
  • , Niu Jianwei
  • , Hu Jianping
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Compressed video sequences are very vulnerable to channel disturbances when transmitted through the burst-packet-loss wireless channels. Transmission errors not only corrupt the current frame, but may also propagate to succeeding frames. We find that a number of current proposed post-processing error concealment methods exploit the spatial/temporal redundancy in the video stream can not actually conceal the transmission errors effectively, because they ignored the fact that the neighboring blocks can be easily lost by the burst packet losses and the correlation was considered only in the current frame, which all limited the ability to obtain an optimal recovery. In this paper, a novel error concealment algorithm is proposed for video transmissions in a wireless environment Our method is applicable to the wireless visual communications due to its low computational costs and acceptable image quality not only in the current decoded frame but also in the succeeding B and P frames that depend on the corrupted frame. Simulation proves that the proposed algorithm can be chosen as good trade-off between video quality and computational load in wireless networks.

Original languageEnglish
Title of host publicationMobile Computing and Wireless Communications International Conference, MCWC 2006
Pages129-132
Number of pages4
DOIs
StatePublished - 2006
EventMobile Computing and Wireless Communications International Conference, MCWC 2006 - Amman, Jordan
Duration: 17 Sep 200620 Sep 2006

Publication series

NameMobile Computing and Wireless Communications International Conference, MCWC 2006

Conference

ConferenceMobile Computing and Wireless Communications International Conference, MCWC 2006
Country/TerritoryJordan
CityAmman
Period17/09/0620/09/06

Fingerprint

Dive into the research topics of 'An error concealment algorithm in wireless networks'. Together they form a unique fingerprint.

Cite this