Application layer error correction scheme for video header protection on wireless network

Chia Ho Pan*, I. Hsien Lee, Sheng-Chieh Huang, Chih Chi Cheng, Chung Jr Lian, Liang Gee Chen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In wireless video streaming application, video information may be corrupted by a noisy channel. By introducing error resilience and error concealment techniques, many researchers have tried to eliminate quality degradation of reconstructed picture in decoding a corrupted data. On the contrary, there are relatively fewer works discussing the ways to diminish the corruption. Hence, system designers need to use different methods to restrict the error cause by channel within a tolerable extent. In other words, the system will be difficult to be implemented in practical design. In this paper, we propose a way to protect the video header information in application layer without modifying standardized syntax. Beside, we also consider channel condition of wireless transmission and propose a way to reduce redundant bits used in channel coding. By doing this, the bitstream can be simply transmitted over practical wireless network and the reconstructed picture quality outperforms the original one.

Original languageEnglish
Title of host publicationProceedings - Seventh IEEE International Symposium on Multimedia, ISM 2005
Pages499-505
Number of pages7
DOIs
StatePublished - 14 Dec 2005
EventSeventh IEEE International Symposium on Multimedia, ISM 2005 - Irvine, CA, United States
Duration: 12 Dec 200514 Dec 2005

Publication series

NameProceedings - Seventh IEEE International Symposium on Multimedia, ISM 2005
Volume2005

Conference

ConferenceSeventh IEEE International Symposium on Multimedia, ISM 2005
CountryUnited States
CityIrvine, CA
Period12/12/0514/12/05

Fingerprint Dive into the research topics of 'Application layer error correction scheme for video header protection on wireless network'. Together they form a unique fingerprint.

Cite this