共查询到20条相似文献,搜索用时 0 毫秒
1.
Raouf Hamzaoui Vladimir Stankovi? Zixiang Xiong 《IEEE transactions on image processing》2005,14(10):1417-1421
We consider a joint source-channel coding system that protects an embedded bitstream using a finite family of channel codes with error detection and error correction capability. The performance of this system may be measured by the expected distortion or by the expected number of correctly decoded source bits. Whereas a rate-based optimal solution can be found in linear time, the computation of a distortion-based optimal solution is prohibitive. Under the assumption of the convexity of the operational distortion-rate function of the source coder, we give a lower bound on the expected distortion of a distortion-based optimal solution that depends only on a rate-based optimal solution. Then, we propose a local search (LS) algorithm that starts from a rate-based optimal solution and converges in linear time to a local minimum of the expected distortion. Experimental results for a binary symmetric channel show that our LS algorithm is near optimal, whereas its complexity is much lower than that of the previous best solution. 相似文献
2.
A state-of-the-art progressive source encoder is combined with a concatenated block coding mechanism to produce a robust source transmission system for embedded bit streams. The proposed scheme efficiently trades off the available total bit budget between information bits and parity bits through efficient information block size adjustment, concatenated block coding, and random block interleavers. The objective is to create embedded codewords such that, for a particular information block, the necessary protection is obtained via multiple channel encodings, contrary to the conventional methods that use a single code rate per information block. This way, a more flexible protection scheme is obtained. The information block size and concatenated coding rates are judiciously chosen to maximize system performance, subject to a total bit budget. The set of codes is usually created by puncturing a low-rate mother code so that a single encoder-decoder pair is used. The proposed scheme is shown to effectively enlarge this code set by providing more protection levels than is possible using the code rate set directly. At the expense of complexity, average system performance is shown to be significantly better than that of several known comparison systems, particularly at higher channel bit error rates. 相似文献
3.
Chingfu Lan Tianli Chu Narayanan K.R. Zixiang Xiong 《Communications, IEEE Transactions on》2004,52(7):1092-1101
This paper considers designing and applying punctured irregular repeat-accumulate (IRA) codes for scalable image and video transmission over binary symmetric channels. IRA codes of different rates are obtained by puncturing the parity bits of a mother IRA code, which uses a systematic encoder. One of the main ideas presented here is the design of the mother code such that the entire set of higher rate codes obtained by puncturing are good. To find a good unequal error protection for embedded bit streams, we employ the fast joint source-channel coding algorithm in Hamzaoui et al. to minimize the expected end-to-end distortion. We test with two scalable image coders (SPIHT and JPEG-2000) and two scalable video coders (3-D SPIHT and H.26L-based PFGS). Simulations show better results with IRA codes than those reported in Banister et al. with JPEG-2000 and turbo codes. The IRA codes proposed here also have lower decoding complexity than the turbo codes used by Banister et al. 相似文献
4.
Multilevel codes for unequal error protection 总被引:2,自引:0,他引:2
Calderbank A.R. Seshadri N. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1993,39(4):1234-1248
Two combined unequal error protection (UEP) coding and modulation schemes are proposed. The first method multiplexes different coded signal constellations, with each coded constellation providing a different level of error protection. In this method, a codeword specifies the multiplexing rule and the choice of the codeword from a fixed codebook is used to convey additional important information. The decoder determines the multiplexing rule before decoding the rest of the data. The second method is based on partitioning a signal constellation into disjoint subsets in which the most important data sequence is encoded, using most of the available redundancy, to specify a sequence of subsets. The partitioning and code construction is done to maximize the minimum Euclidean distance between two different valid subset sequences. This leads to ways of partitioning the signal constellations into subsets. The less important data selects a sequence of signal points to be transmitted from the subsets. A side benefit of the proposed set partitioning procedure is a reduction in the number of nearest neighbors, sometimes even over the uncoded signal constellation 相似文献
5.
Pavlushkov V. Johannesson R. Zyablov V.V. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(2):700-708
In this correspondence, unequal error-correcting capabilities of convolutional codes are studied. For errors in the information symbols and code symbols, the free input- and output-distances, respectively, serve as "unequal" counterparts to the free distance. When communication takes place close to or above the channel capacity the error bursts tend to be long and the free distance is not any longer useful as the measure of the error correcting capability. Thus, the active burst distance for a given output and the active burst distance for a given input are introduced as "unequal" counterparts to the active burst distance and improved estimates of the unequal error-correcting capabilities of convolutional codes are obtained and illustrated by examples. Finally, it is shown how to obtain unequal error protection for both information and code symbols using woven convolutional codes. 相似文献
6.
Fast decoding algorithm for RS codes 总被引:1,自引:0,他引:1
Suming Ju Guangguo Bi 《Electronics letters》1997,33(17):1452-1453
The singularity of the syndrome matrix is used to determine the error locations. After each error location has been ascertained, the syndrome values are calculated by an iteration method and the orders of the syndrome matrix are reduced by one. With the syndrome values of iteration, the error values are easily evaluated 相似文献
7.
Nikolaos Thomos Nikolaos V Boulgouris Michael G Strintzis 《IEEE transactions on image processing》2005,14(11):1890-1901
A novel image transmission scheme is proposed for the communication of set partitioning in hierarchical trees image streams over wireless channels. The proposed scheme employs turbo codes and Reed-Solomon codes in order to deal effectively with burst errors. An algorithm for the optimal unequal error protection of the compressed bitstream is also proposed and applied in conjunction with an inherently more efficient technique for product code decoding. The resulting scheme is tested for the transmission of images over wireless channels. Experimental evaluation clearly demonstrates the superiority of the proposed transmission system in comparison to well-known robust coding schemes. 相似文献
8.
Morelos-Zaragoza R.H. Shu Lin 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1995,41(2):576-581
Unequal error protection (UEP) codes find applications in broadcast channels, as well as in other digital communication systems, where messages have different degrees of importance. Binary linear UEP (LUEP) codes combined with a Gray mapped QPSK signal set are used to obtain new efficient QPSK block-modulation codes for unequal error protection. Several examples of QPSK modulation codes that have the same minimum squared Euclidean distance as the best QPSK modulation codes, of the same rate and length, are given. In the new constructions of QPSK block-modulation codes, even-length binary LUEP codes are used. Good even-length binary LUEP codes are obtained when shorter binary linear codes are combined using either the well-known |u¯|u¯+v¯|-construction or the so-called construction X. Both constructions have the advantage of resulting in optimal or near-optimal binary LUEP codes of short to moderate lengths, using very simple linear codes, and may be used as constituent codes in the new constructions. LUEP codes lend themselves quite naturally to multistage decoding up to their minimum distance, using the decoding of component subcodes. A new suboptimal two-stage soft-decision decoding of LUEP codes is presented and its application to QPSK block-modulation codes for UEP illustrated 相似文献
9.
The modified Plotkin bound for unequal error protection (UEP) codes is derived. Based on the separation vector of UEP codes, the authors adopt the average separation of all information digits of a given UEP code, and replacing it with minimum distance in the normal Plotkin bound leads to the new bound, which is valid for both linear and nonlinear UEP codes 相似文献
10.
Expanding window fountain codes for unequal error protection 总被引:1,自引:0,他引:1
Sejdinovic D. Vukobratovic D. Doufexi A. Senk V. Piechocki R. 《Communications, IEEE Transactions on》2009,57(9):2510-2516
A novel approach to provide unequal error protection (UEP) using rateless codes over erasure channels, named Expanding Window Fountain (EWF) codes, is developed and discussed. EWF codes use a windowing technique rather than a weighted (non-uniform) selection of input symbols to achieve UEP property. The windowing approach introduces additional parameters in the UEP rateless code design, making it more general and flexible than the weighted approach. Furthermore, the windowing approach provides better performance of UEP scheme, which is confirmed both theoretically and experimentally. 相似文献
11.
Software implementations of error detection codes are considered to be slow compared to other parts of the communication system. This is especially true for powerful error detection codes such as CRC. However, we have found that powerful error detection codes can run surprisingly fast in software. We discuss techniques for, and measure the performance of, fast software implementation of the cyclic redundancy check (CRC), weighted sum codes (WSC), one's-complement checksum, Fletcher (1982) checksum, CXOR checksum, and block parity code. Instruction count alone does not determine the fastest error detection code. Our results show the computer memory hierarchy also affects performance. Although our experiments were performed on a Sun SPARCstation LX, many of the techniques and conclusions will apply to other processors and error detection codes. Given the performance of various error detection codes, a protocol designer can choose a code with the desired speed and error detection power that is appropriate for his network and application 相似文献
12.
The authors present a new simple method for designing turbo codes with unequal error protection (UEP). An example is given to provide numerical evidence of its effectiveness 相似文献
13.
We show how parallel concatenated codes (PCCs, also known as “turbo codes”) can be endowed with unequal error protection (UEP). Given the two component encoders of the PCC encoder and the desired interleaver size, UEP is achieved by: (1) suitably positioning the different importance classes of information symbols into the encoder input frame; (2) puncturing the PCC redundancy symbols with a nonuniform pattern; and (3) choosing the interleaver of the PCC encoder in a class of interleavers that guarantees isolation of the importance classes. By controlling the amount of redundancy assigned to each importance class and the class positioning in the input frame, a whole family of UEP PCCs with different UEP levels can be obtained from the same component encoders and interleaver size. From a practical viewpoint, a family of UEP PCCs can be decoded by the same “turbo” iterative decoder, provided that the decoder hardware implementation allows for programmable puncturing and interleaving 相似文献
14.
Stevens P. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(4):890-895
The decoding of unequal error protection product codes, which are a combination of linear unequal error protection (UEP) codes and product codes, is addressed. A nonconstructive proof of the existence of a good error-erasure-decoding algorithm is presented; however, obtaining the decoding procedure is still an open research problem. A particular subclass of UEP product codes is considered, including a decoding algorithm that is an extension of the Blokh-Zyablov decoding algorithm for product codes. For this particular subclass the decoding problem is solved 相似文献
15.
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1980,26(5):513-517
A new algorithm is presented for constructing nearly optimal prefix codes in the case of unequal letter costs and unequal probabilities. A bound on the maximal deviation from the optimum is derived and numerical examples are given. The algorithm has running timeO(t cdot n) , wheret is the number of letters andn is the number of probabilities. 相似文献
17.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(3):544-546
The methods for combining codes, such as the direct sum, direct product, and|u|u + v| constructions, concatenation, etc., are extended to linear unequal error protection codes. 相似文献
18.
It is shown how an intermediate chord property in the Cooley-Tukey FFT algorithm over a finite field can be used in faster decoding of the Bose-Chaudhuri-Hocquenghen codes in the spectral domain. 相似文献
19.
This paper presents the design and implementation of an error-resilient H.264/AVC-based embedded video conferencing scheme over Internet. We first develop a fast recursive algorithm to estimate the decoder-side distortion of each frame in the presence of packet loss. The algorithm operates at block level, and considers the impacts of different intra prediction modes, the unrestricted intra prediction, and the skip mode. We then design a family of very short systematic forward error correction codes with linear encoding and decoding complexity, which runs across the slices of each frame to recover lost packets. An optimization problem is then formulated to minimize the decoder-side distortion by allocating a given channel coding redundancy among a group of frames. Various techniques are introduced to speed up the algorithm without sacrificing too much accuracy, in order to meet the hardware and real-time constraints of the system. As a result, the proposed scheme can run on a real-time embedded video conferencing system with resolution up to 1024×576 pixels, 30 frames per second (fps) and 4 megabits per second (Mbps). 相似文献
20.
New results on self-orthogonal unequal error protection codes 总被引:1,自引:0,他引:1
Zhi Chen Pingzhi Fan Fan Jin 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(5):1141-1144
A lower bound on the length of binary self-orthogonal unequal error protection (UEP) codes is derived, and two design procedures for constructing optimal self-orthogonal UEP codes are proposed. With this lower bound, known self-orthogonal UEP codes can be evaluated. It is pointed out that, for given values of minimum distance and code rate, the self-orthogonal codes must be relatively long, so optimal self-orthogonal codes are not optimal in general. But self-orthogonal codes can be implemented simply, and they have error-correcting capabilities beyond those guaranteed by their minimum distance. These properties can be viewed as a partial compensation for using self-orthogonal codes 相似文献