Spline-based boundary loss concealment. Schuster, G., Li, X., & Katsaggelos, A. In Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429), volume 3, pages II–671–4, 2003. IEEE.
Spline-based boundary loss concealment [link]Paper  doi  abstract   bibtex   
Object-based video coding requires the transmission of the object shape. This shape is sent as a binary $α$-plane. In lossy packet-based networks, such as the Internet, this information has a non-negligible probability of not arriving at the receiver, and hence its loss needs to be concealed. In this paper we propose a shape concealment technique utilizing Hermite splines. The algorithm has the following steps: (I) the received boundary is detected and the lost boundary parts are grouped using the packet loss pattern. (II) for each of these lost boundary parts, the received boundary points that border the area of the lost boundary parts are collected. These boundary points are then modelled by a second order Hermite spline. This model is subsequently used to match the velocity along the received boundary with the velocity of the concealing cubic Hermite spline. (III) since in most cases there are more than one concealing splines we draw every spline combination that does not result in an intersection and keep all possible results until the end. (IV) if there are more than one possible solutions we select the one that results in one overall closed non-intersecting boundary and fill the interior of the boundary to get the concealed $α$-plane, Experimental results which demonstrate and compare the performance of the proposed concealment method are given at the end of the paper.
@inproceedings{Guido2003,
abstract = {Object-based video coding requires the transmission of the object shape. This shape is sent as a binary $\alpha$-plane. In lossy packet-based networks, such as the Internet, this information has a non-negligible probability of not arriving at the receiver, and hence its loss needs to be concealed. In this paper we propose a shape concealment technique utilizing Hermite splines. The algorithm has the following steps: (I) the received boundary is detected and the lost boundary parts are grouped using the packet loss pattern. (II) for each of these lost boundary parts, the received boundary points that border the area of the lost boundary parts are collected. These boundary points are then modelled by a second order Hermite spline. This model is subsequently used to match the velocity along the received boundary with the velocity of the concealing cubic Hermite spline. (III) since in most cases there are more than one concealing splines we draw every spline combination that does not result in an intersection and keep all possible results until the end. (IV) if there are more than one possible solutions we select the one that results in one overall closed non-intersecting boundary and fill the interior of the boundary to get the concealed $\alpha$-plane, Experimental results which demonstrate and compare the performance of the proposed concealment method are given at the end of the paper.},
author = {Schuster, G.M. and Li, Xiaohuan and Katsaggelos, A.K.},
booktitle = {Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429)},
doi = {10.1109/ICIP.2003.1246769},
isbn = {0-7803-7750-8},
pages = {II--671--4},
publisher = {IEEE},
title = {{Spline-based boundary loss concealment}},
url = {http://ieeexplore.ieee.org/document/1246769/},
volume = {3},
year = {2003}
}

Downloads: 0