Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi

Slides:



Advertisements
Similar presentations
Scalable Video Multicast Using Expanding Window Fountain Codes Dejan Vukobratovic´,Vladimir Stankovic´, Dino Sejdinovic´, Lina Stankovic´,Zixiang Xiong.
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Performance analysis of LT codes with different degree distribution
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
Sang-Chun Han Hwangjun Song Jun Heo International Conference on Intelligent Hiding and Multimedia Signal Processing (IIH-MSP), Feb, /05 Feb 2009.
SVC-Based Multisource Streaming for Robust Video Transmission in Mobile Ad-Hoc Networks Thomas Schierl, Karsten Ganger, Cornelius Hellge, and Thomas Wiegand.
An Error-Resilient GOP Structure for Robust Video Transmission Tao Fang, Lap-Pui Chau Electrical and Electronic Engineering, Nanyan Techonological University.
Periodic Broadcasting with VBR- Encoded Video Despina Saparilla, Keith W. Ross and Martin Reisslein (1999) Prepared by Nera Liu Wing Chun.
2001/10/25Sheng-Feng Ho1 Efficient and Scalable On- Demand Data Streaming Using UEP Codes Lihao Xu Washington University in St. Louis ACM Multimedia 2001.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
Robust Scalable Video Streaming over Internet with Network-Adaptive Congestion Control and Unequal Loss Protection Quan Zang, Guijin Wang, Wenwu Zhu, and.
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
Reliable and Smooth Fine Granular Scalable Video Streaming Zhibo Chen Yun He 2002 IEEE Region 10 Conference on Computer, Communications, Control and Power.
Efficient Fine Granularity Scalability Using Adaptive Leaky Factor Yunlong Gao and Lap-Pui Chau, Senior Member, IEEE IEEE TRANSACTIONS ON BROADCASTING,
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Wireless FGS video transmission using adaptive mode selection and unequal error protection Jianhua Wu and Jianfei Cai Nanyang Technological University.
1 An Efficient Mode Decision Algorithm for H.264/AVC Encoding Optimization IEEE TRANSACTION ON MULTIMEDIA Hanli Wang, Student Member, IEEE, Sam Kwong,
1 Scalable Video Coding with Digital Fountain Kai-Chao Yang.
Multi-Path Transport of FGS Video Jian Zhou, Huai-Rong Shao, Chia Shen and Ming-Ting Sun ICME 2003.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Liquan Shen Zhi Liu Xinpeng Zhang Wenqiang Zhao Zhaoyang Zhang An Effective CU Size Decision Method for HEVC Encoders IEEE TRANSACTIONS ON MULTIMEDIA,
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
RELIABLE MULTIMEDIA TRANSMISSION OVER COGNITIVE RADIO NETWORKS USING FOUNTAIN CODES Proceedings of the IEEE | Vol. 96, No. 1, January 2008 Harikeshwar.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
1 Adaptable applications Towards Balancing Network and Terminal Resources to Improve Video Quality D. Jarnikov.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
Low-Power H.264 Video Compression Architecture for Mobile Communication Student: Tai-Jung Huang Advisor: Jar-Ferr Yang Teacher: Jenn-Jier Lien.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
1 Unequal Error Protection Using Fountain Codes With Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Faculty of Technology,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Prioritized Distributed Video Delivery With Randomized Network Coding IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 13, NO. 4, AUGUST 2011 Nikolaos Thomos Jacob.
Encoding Stored Video for Streaming Applications IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 2, FEBRUARY 2001 I.-Ming.
Adaptive QoS Control of Multimedia Transmission Over Band-limited Networks Presenter: Hu Huang Nov G.Y.Hong 1, Member, IEEE, A.C.M.Fong 1, Member,
Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
A hybrid error concealment scheme for MPEG-2 video transmission based on best neighborhood matching algorithm Li-Wei Kang and Jin-Jang Leou Journal of.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Speaker: Yu-Jen Lai Cheng-Chih Chao Advisor: Hung-Yu Wei 2009/06/08 1 Dong Nguyen, Tuan Tran, Thinh Nguyen, and Bella Bose, Fellow, IEEE IEEE TRANSACTIONS.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
An improved LT encoding scheme with extended chain lengths
Adaptive Block Coding Order for Intra Prediction in HEVC
Group Multicast Capacity in Large Scale Wireless Networks
Advanced Wireless Networks
Advanced Computer Networks
Signaling Method for Multiple Data Rate
Limitations of Traditional Error-Resilience Methods
Scalable Speech Coding for IP Networks: Beyond iLBC
Linglong Dai, Jintao Wang, Zhaocheng Wang and Jun Wang
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Multi-band Modulation, Coding, and Medium Access Control
Multi-band Modulation, Coding, and Medium Access Control
Unequal Error Protection for Video Transmission over Wireless Channels
Presentation transcript:

Unequal Error Protection Using Fountain Codes With Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Faculty of Technology, De Montfort University, Leicester, U.K. IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 13, NO. 1, FEBRUARY 2011

Outlines Introduction Proposed method Experimental results Conclusions

Introduction Application layer forward error correction (FEC) Deal with the problem of packet loss in networks that do not guarantee quality of service. Fountain codes Luby Transform (LT) codes Raptor codes Advantages 1) Fountain codes have a much lower encoding and decoding complexity. 2) Fountain codes are rateless that the encoder can generate on the fly as many encoded symbols as needed.

Introduction Contributions A method to decrease the bit error rate (BER) of LT codes. The idea is to duplicate the set of information symbols and extend the original degree distribution to the new set of information symbols. Decrease the BER at the cost of a controllable increase in encoding and decoding complexity. An extension of this idea to UEP with LT codes. In particular, we apply our UEP scheme to the problem of video multicast with heterogeneous receivers.

Fig. 1. Graph of an LT code. Eight encoded symbols are generated from k=6 information symbols. The degree of an encoded symbol is the number of information symbols that were used to generate it. For example, the degree of e0 is equal to two.

Previous work Rahnavard, Vellambi, and Fekri [4] were the first to propose a method to provide UEP with LT codes. Consider a source block having k information symbols. Partition this block into two blocks S1 and S2 of length |S1|=αk and |S2|=(1-α)k , respectively, where 0 <α<1. The block S1 is called the block of most important bits (MIB) while the block S2 is called the block of least important bits (LIB). Define probabilities p1 and p2 (p1 + p2 =1) to select S1 and S2, respectively. Given a suitable probability distribution Ω(x) on {1, …, k} , a sequence of encoded symbols em , m≧0 is generated as follows. For each m: 1)Select randomly a degree dm {1, …, k} according to the distribution Ω(x). 2)Select dm distinct information symbols successively. To select a symbol, first select one of the two blocks S1 or S2(S1 with probability p1 and S2 with probability p2). Then choose randomly a symbol from the selected block. 3)Set em equal to the bitwise modulo 2 sum of the dm selected information symbols. [4] N. Rahnavard, B. N. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Trans. Inf. Theory, vol. 53, no. 4, pp. 1521–1532, Apr. 2007.

Fig. 2. UEP scheme proposed in [4]. Two levels of protection are used Fig. 2. UEP scheme proposed in [4]. Two levels of protection are used. The MIB block contains 2 information symbols while the LIB block contains 4 information symbols. [4] N. Rahnavard, B. N. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Trans. Inf. Theory, vol. 53, no. 4, pp. 1521–1532, Apr. 2007.

Previous work A source block having k information symbols is partitioned into L blocks S1,S2,…, SL such that the first information symbols of the source block |S1| are the most important bits, the next |S2| information symbols are the next most important bits, and so on. Then windows W1,W2, …,WL are defined such that is the concatenation of the blocks S1,S2,…, Si . Thus, the size of the i-th window is . For every window Wi, an LT code with a degree distribution on the set {1,…,|Wi|} is defined. To generate an encoded symbol Wi, a window is selected according to a probability distribution Here Τi is the probability that window Wi is chosen. Then the LT code defined on is applied. UEP is achieved by choosing appropriate values for [5] D. Sejdinovic, D. Vukobratovic, A. Doufexi, V. Senk, and R. J. Piechocki, “Expanding window fountain codes for unequal error protection,” in Proc. 41st Asilomar Conf. Sig. Syst. Comp., Pacific Grove, CA, Nov. 2007, pp. 1020–1024.

Fig. 3. UEP scheme proposed in [5]. Two windows W1 and W2 are used Fig. 3. UEP scheme proposed in [5]. Two windows W1 and W2 are used. The encoded symbols e0 and e3 are generated from W1 while the remaining encoded symbols are generated from W2. [5] D. Sejdinovic, D. Vukobratovic, A. Doufexi, V. Senk, and R. J. Piechocki, “Expanding window fountain codes for unequal error protection,” in Proc. 41st Asilomar Conf. Sig. Syst. Comp., Pacific Grove, CA, Nov. 2007, pp. 1020–1024.

Fig. 4. Sliding window technique of [14]. (A) Without window overlap Fig. 4. Sliding window technique of [14]. (A) Without window overlap. (B) With window overlap. [14] M. C. O. Bogino, P. Cataldi, M. Grangetto, E. Magli, and G. Olmo, “Sliding-window digital fountain codes for streaming of multimedia contents,” in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS), New Orleans, LA, May 2007, pp. 3467–3470.

Proposed Method Sliding Windows: http://www.powercam.cc/slide/743

Proposed Method Sliding Windows: Number of windows that consider a particular symbol: w / s window length window movement overlap region A G M B D C E H J I K N P O Q F L R w = 6 s = 2 http://www.powercam.cc/slide/743

Proposed method Consider a source block S =i0 * …*ik-1 consisting of k information symbols i0 , …, ik-1 Let Ω(x) be the degree distribution of an LT code on {1, …, k} We expand the source block S by repeatedly appending the same information symbols at the end of the block. The new (virtual) source block can be written EF (Expanding Factor) denotes the number of times the original source block occurs in the new source block. This new source block has a length of EF x k and its information symbols have indices ranging from 0 to EF x k - 1. Extend the original degree distribution from {1,…, k} to {1,…, EF x k }

Fig. 5. Virtual increase of the source block size for k=4, (left) EF=2 and (right) EF=3.

Proposed method Suppose that a source block S =i0 * …*ik-1 is partitioned into L adjacent blocks S1,S2,…, SL The first block S1 consists of the most important bits, the next block S2 consists of the next most important bits, and so on. S1 > S2 >…>SL We can assign different levels of protection to these blocks by duplicating them according to a sequence of Repeat Factors(RF), RFi, i=1,…,L Information symbols have indices ranging from 0 to Extend the degree distribution of the LT code from {1,…, k} to

k=6 RF2=1 k=8 EF(RF1 x 2 + RF2 x 4) =2(2x2+1x4)=16 Fig. 6. Building a virtual source block with the proposed UEP with k=6, EF=2, and RF1=2, and RF2=1.

Experimental Results Setting BER was calculated as the average (over the number of simulations) of (k - d) / k k is the number of original information symbols d is the number of (correctly) decoded symbols PSNR was calculated as the average (over the number of simulations) of the mean (over all frames) of the PSNR of the luminance (Y) component Transmission overhead t = (n – k) / k n is the number of transmitted symbols The results were measured on a PC running an Intel Core 2 CPU 1.66 GHz with 1 GB of RAM.

Even for large values of the expanding factor, both the encoding and the decoding are fast. Fig. 7. Average encoding time versus expanding factor for k=1000 and various transmission overheads.

Note that the time complexity does not increase linearly with the expanding factor. Fig. 8. Average decoding time versus expanding factor for k=1000 and various transmission overheads.

The BER performance of our approach was better than that of the SW approach when the transmission overhead was larger than about 0.05. Fig. 9. BER versus transmission overhead for our approach and the sliding window method (SW) of [14]. The number of information symbols is k=20000. For the SW method, the window size is w=2000. The curve “Proposed (EF=8, w=2000)” shows results for our method when it was applied on windows of size 2000 with EF=8.

Since SW applies LT coding on smaller blocks, its encoding time was lower. The decoding time of SW was also lower when the transmission overhead was small. Fig. 10. Encoding time for our approach and the sliding window method (SW) of [14]. The number of information symbols is k=20000. For the SW method, the window size is w=2000.

The decoding time of our scheme almost stops increasing when the transmission overhead reaches about 8%. Fig. 11. Decoding time for our approach and the sliding window method (SW) of [14]. The number of information symbols is k=20000. For the SW method, the window size is w=2000.

Our scheme provided better performance for both the MIB and the LIB blocks when a low BER was targeted. Fig. 12. BER versus transmission overhead. There are k=1000 information symbols, 100 of which belong to the MIB block. Our scheme is used with the robust soliton distribution. The scheme of [4] is used with the fixed degree distribution (2). The scheme of [5] is used with the robust soliton distribution for the MIB block and the fixed degree distribution for the LIB block.

Fig. 13. BER versus transmission overhead Fig. 13. BER versus transmission overhead. There are k=5000 information symbols, 500 of which belong to the MIB block. Our scheme is used with the robust soliton distribution. The scheme of [4] is used with the fixed degree distribution (2). The scheme of [5] is used with the robust soliton distribution for the MIB block and the fixed degree distribution for the LIB block.

The schemes of [4] and [5] have an additional decision-making step in the encoding. However, the average degree of an encoded symbol is larger in our scheme. Consequently, both the encoding and decoding time of our scheme were higher than those of [4] and [5]. Fig. 15. Average decoding time versus transmission overhead for k=1000. Fig. 14. Average encoding time versus transmission overhead for k=1000.

TABLE I SVC ENCODING OF THE FIRST GOP OF THE STEFAN VIDEO SEQUENCE (352 X 288, 30 FPS) INTO ONE BASE LAYER (BL) AND 14 ENHANCEMENT LAYERS (EL). THE TABLE SHOWS THE NUMBER OF SYMBOLS, THE BITRATE IN KBPS, AND THE Y-PSNR IN dB.

Increase from 2 to 3 increases the likelihood of decoding the BL successfully. But decreases the likelihood of successfully decoding the ELs, leading to a decrease of the overall PSNR. Fig. 16. PSNR as a function of the transmission overhead for the transmission of the Stefan sequence with the proposed UEP scheme. The performance of the scheme is shown for different settings of EF and RF.

On average, the robust soliton distribution provided better results than the fixed degree distribution for both UEP schemes, [4] and [5]. Fig. 18. PSNR as a function of the transmission overhead for the transmission of the Stefan sequence with the UEP scheme of [5]. Fig. 17. PSNR as a function of the transmission overhead for the transmission of the Stefan sequence with the UEP scheme of [4].

The PSNR curve of our UEP scheme had a similar shape to the one of [4]. Compared to the UEP scheme of [5], our scheme had a better performance at average and high overhead but worse performance at low overhead. Fig. 19. PSNR as a function of the transmission overhead for the proposed UEP scheme, the UEP scheme of [4], and the UEP scheme of [5] with their best settings.

For our scheme, the best results were achieved with RF=2 and EF=20. Fig. 20. Average PSNR of m=2 receiver classes with symbol loss rates 0.02 and 0.04, as a function of the transmission overhead for our UEP scheme for different settings of EF and ER.

For the schemes of [4] and [5], the fixed degree distribution gave higher PSNR at low overhead. But much lower PSNR at high overhead compared to the robust soliton distribution. Fig. 22. Average PSNR of m=2 receiver classes as a function of the transmission overhead for the UEP scheme of [5]. Fig. 21. Average PSNR of m=2 receiver classes as a function of the transmission overhead for the UEP scheme of [4].

Our UEP scheme always outperformed the UEP scheme of [4] and [5]. Our UEP scheme achieved an average video quality of about 37 dB with 50% less transmission overhead (or 10% less bandwidth). Fig. 23. Average PSNR of m=2 receiver classes as a function of the transmission overhead for the proposed UEP scheme, the UEP scheme of [4], and the UEP scheme of [5] with their best settings.

The scheme of [5] achieved an acceptable video quality (about 25 dB) for the receiver with the worst channel conditions at a lower transmission overhead. Fig. 24. PSNR of receiver class with symbol loss rate 0.02 as a function of the transmission overhead.

Fig. 25. PSNR of receiver class with symbol loss rate 0 Fig. 25. PSNR of receiver class with symbol loss rate 0.04 as a function of the transmission overhead.

Conclusions We proposed a method that improves the BER performance of LT codes by strengthening the degree distribution. Our scheme had higher coding complexity but required lower transmission overhead to achieve low BER.

References [4] N. Rahnavard, B. N. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Trans. Inf. Theory, vol. 53, no. 4, pp. 1521–1532, Apr. 2007. [5] D. Sejdinovic, D. Vukobratovic, A. Doufexi, V. Senk, and R. J. Piechocki, “Expanding window fountain codes for unequal error protection,” in Proc. 41st Asilomar Conf. Sig. Syst. Comp., Pacific Grove, CA, Nov. 2007, pp. 1020–1024. [6] D. Vukobratovic, V. Stankovic´, D. Sejdinovic, L. Stankovic´, and Z. Xiong, “Scalable video multicast using expanding window fountain codes,” IEEE Trans. Multimedia, vol. 11, no. 6, pp. 1094–1104, Oct. 2009. [12] S. Ahmad, R. Hamzaoui, and M. Al-Akaidi, “Unequal error protection using LT codes and block duplication,” in Proc. MESM 08, Middle Eastern Multiconf.Simulation and Modelling, Amman, Jordan, Aug. 2008, pp. 104–108. [13] S. Ahmad, R. Hamzaoui, and M. Al-Akaidi, “Video multicast using unequal error protection with Luby Transform codes,” in Proc. MESM 09, Middle Eastern Multiconf. Simulation and Modelling, Beirut, Lebanon, Sep. 2009, pp. 72–76. [14] M. C. O. Bogino, P. Cataldi, M. Grangetto, E. Magli, and G. Olmo, “Sliding-window digital fountain codes for streaming of multimedia contents,” in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS), New Orleans, LA, May 2007, pp. 3467–3470. [15] P. Cataldi, M. Grangetto, T. Tillo, E. Magli, and G. Olmo, “Slidingwindow Raptor codes for efficient scalable wireless video broadcasting with unequal loss protection,” IEEE Trans. Image Process., vol. 19, no. 6, pp. 1491–1503, Jun. 2010.