1-3hit |
In this letter, we propose a two-stage object-based error-concealment technique for MPEG-2 video transmitted in a burst-packet-loss environment. A burst packet loss typically destroys a large area of MPEG-2 coded video. In the first stage, the missing area is intra-picture estimated and concealed in terms of a region-based approach. In the second stage, irregular-moving objects with respect to the background are identified and compensated from the predictive picture. As compared with conventional concealment approaches, the proposed method achieves better PSNR performance and reduces the visual artifacts.
Shih-Hsuan YANG Bo-Yuan CHEN Kuo-Hsin WANG
A new H.264 fast inter-mode decision algorithm based on coded block patterns is presented. Compared to the exhaustive mode search, the proposed method achieves an average 57 % reduction in computation time with negligible degradation in visual quality. The speed and rate-distortion performance is comparable to known fast algorithms that involve more elaborate mechanisms.
Shih-Hsuan YANG Chun-Yen LIAO Chin-Yun HSIEH
Although watermarking techniques have been extensively developed for natural videos, little progress is made in the area of graphics animation. Following the former successful MPEG-1 and MPEG-2 coding standards that provide efficient representations of natural videos, the emerging MPEG-4 standard incorporates new coding tools for 2D mesh animation. Graphics animation information is crucial for many applications and may need proper protection. In this paper, we develop a watermarking technique suitable for MPEG-4 2D mesh animation. The proposed method is based on the multiresolution analysis of 2D dynamic mesh. We perform wavelet transform on the temporal sequence of the node points to extract the significant spectral components of mesh movement, which we term the "feature motions. " A binary watermark invisibly resides in the feature motions based on the spread-spectrum principle. Before watermark detection, a spatial-domain least-squares registration technique is used to restore the possibly geometrically distorted mesh data. Each watermark bit is then detected by hard decision with cryptographically secure keys. We have tested the proposed method with a variety of attacks, including affine transformations, temporal smoothing, spectral enhancement and attenuation, additive random noise, and a combination of the above. Experimental results show that the proposed watermarks can withstand the aforementioned attacks.