Error concealment

Error concealment is a technique used in signal processing that aims to minimize the deterioration of signals caused by missing data, called packet loss.[1] A signal is a message sent from a transmitter to a receiver in multiple small packets. Packet loss occurs when these packets are misdirected, delayed, resequenced, or corrupted.[2]

Receiver-Based Techniques

When error recovery occurs at the receiving end of the signal, it is receiver-based. These techniques focus on correcting corrupted or missing data.

Waveform substitution

Preliminary attempts at receiver-based error concealment involved packet repetition, replacing lost packets with copies of previously received packets. This function is computationally simple and is performed by a device on the receiver end called a "drop-out compensator".[3][4]

Zero Insertion

When this technique is used, if a packet is lost, its entries are replaced with 0s.

Interpolation

Interpolation involves making educated guesses about the nature of a missing packet. For example, by following speech patterns in audio or faces in video.

Buffer

Data buffers are used for temporarily storing data while waiting for delayed packets to arrive. They are common in internet browser loading bars and video applications, like YouTube.

Transmitter-Based Techniques

Rather than attempting to recover lost packets, other techniques involve anticipating data loss, manipulating the data prior to transmission.[4]

Retransmission

The simplest transmitter-based technique is retransmission, sending the message multiple times. Although this idea is simple, because of the extra time required to send multiple signals, this technique is incapable of supporting real-time applications.[2]

Packet Repetition

Packet repetition, also called forward error correction (FEC), adds redundant data, which the receiver can use to recover lost packets. This minimizes loss, but increases the size of the packet.[5][6]

Interleaving

Interleaving involves scrambling the data before transmission. When a packet is lost, rather than losing an entire set of data, small portions of several sets will be gone. At the receiving end, the message is then deinterleaved to reveal the original message with minimal loss.

Transmission without interleaving:

Original transmitted sentence:                      ThisIsNotAnExampleOfInterleaving
Received sentence with a burst error:               ThisIsNot______pleOfInterleaving

The term "AnExample" ends up mostly unintelligible and difficult to correct.

With interleaving:

Transmitted sentence:                               ThisIsAnExampleOfInterleaving...
Error-free transmission:                            TIEpfeaghsxlIrv.iAaenli.snmOten.
Received sentence with a burst error:               TIEpfe______Irv.iAaenli.snmOten.
Received sentence after deinterleaving:             T_isI_AnE_amp_eOfInterle_vin_...

No word is completely lost and the missing letters can be recovered with minimal guesswork.[7]

Applications

Depending on the method of transmission (analog or digital), there are a variety of ways for errors to propagate in the message.

Analog Applications

Since its invention in the 1950s, the magnetic coating used in analog video tape has experienced radio frequency (RF) signal drop-outs. Some of the techniques that were used for resolving these issues are analogous to those used for concealing errors in modern compressed video signals.

The process of click removal in audio restoration is another example of error concealment. A closely analogous example in the domain of image processing is the use of digital dust and scratch removal processing in film restoration.

Digital Applications

Error concealment has many digital applications, including web browsing, video conferencing, Skype, and YouTube[2][8]

See also

References

  1. "Video Signal Error Concealment". National Institute of Standards and Technology (NIST). March 29, 2011. Retrieved 2014-10-23.
  2. Carle, Georg; Biersack, Ernst (6 August 2002). "Survey of error recovery techniques for IP-based audio-visual multicast applications". IEEE Network. 11 (6): 24–36. doi:10.1109/65.642357. ISSN 0890-8044. S2CID 13825411.
  3. W.K.E. Geddes (14 December 1964). "R&D Report 1964-77 : Simple drop-out compensator for video tape recorders". Retrieved 2014-10-23.
  4. Kurose, James; Ross, Keith (2013). Computer Networking: a Top-Down Approach (PDF) (6th ed.). Pearson Education Inc. p. 640. ISBN 978-0-13-285620-1. Archived from the original (PDF) on 7 February 2015. Retrieved 30 October 2014.
  5. Nimrod Peleg (January 2003). "Error Resilience and Concealment in Video Coding : With focus on H.261/3" (PDF). Retrieved 2013-03-21.
  6. Podolsky, M (29 Mar – 2 Apr 1998). "Simulation of FEC-based error control for packet audio on the Internet". Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98CH36169). INFOCOM '98. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. 2. pp. 505–515. CiteSeerX 10.1.1.33.1853. doi:10.1109/INFCOM.1998.665068. ISBN 978-0-7803-4383-2. ISSN 0743-166X. S2CID 5056164.
  7. Forward error correction#Example
  8. Sat, Batu; Wah, Benjamin (9–12 July 2006). "Analysis and Evaluation of the Skype and Google-Talk Voip Systems". 2006 IEEE International Conference on Multimedia and Expo. pp. 2153–2156. doi:10.1109/ICME.2006.262681. ISBN 978-1-4244-0366-0. S2CID 6905228.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.