Performance Evaluation of Edge-based Video Error Concealment using H.264 Flexible Macroblock Ordering
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 12
Abstract
This paper evaluates the directional interpolation scheme used widely for spatial error concealment in the H.264/AVC video coding standard using Flexible Macroblock Ordering (FMO). A mathematical analysis of FMO is presented to illustrate its effectiveness as an error resilience tool. Compared to the weighted pixel interpolation scheme of the test model, the directional interpolation scheme gives a relatively improved error concealment performance, since it preserves the edge direction of the damaged area by using the information from correctly received neighboring regions. However, the effectiveness of this technique depends on the method used for determining the dominant edge direction for the damaged area. Two methods are discussed, and simulations are conducted to test their performance for varied video content. Also, a variation of the commonly used PSNR quality metric is defined to obtain true performance results based on Jensen’s inequality.
Authors and Affiliations
Santosh Chapaneri , Saurabh Mistry , Sannidhi Dixit
Effect of Morphological Filters on Medical Image Segmentation using Improved Watershed Segmentation
In this paper, denoising and segmentation of medical image is performed using morphological filters and watershed algorithm. Watershed Algorithm provides the complete division of image. It has low computational complexit...
A Study on signcryption Scheme Based on Eliptic Curve
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure commu...
System for Devices mobile based in recognition facial
In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency a...
Secure Routing Backup Protocol for MANET from Selective Forwarding Attack
In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. One of the most important of these fields concerns mobi...
Methodology and Analysis for Various SQL Injection Techniques
Now day’s online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, secur...