• No results found

Error Resilient Image Transmission over Wireless Fading Channels

N/A
N/A
Protected

Academic year: 2020

Share "Error Resilient Image Transmission over Wireless Fading Channels"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

Error Resilient Image Transmission over

Wireless Fading Channels

M Padmaja [1] M Kondaiah [2] K Sri Rama Krishna [3]

[1]

Assistant Professor, Dept of ECE, V R Siddhartha Engineering College, Vijayawada [2]

PG Student, Dept of ECE, V R Siddhartha Engineering College, Vijayawada [3]

Professor and Head, Dept of ECE, V R Siddhartha Engineering College, Vijayawada

Abstract: Nowadays transferring images and video over wireless channels is becoming more use of the medium. However, a wireless medium is not very reliable in the way that it adds unwanted components and noise to the wireless transmission. So there may be a loss of data. Due to this possible loss of data without the capability of resending a correct version we need a system to protect and correct such losses. The transmission of images over wireless channels is examined using reorganization of the compressed images into error-resilient, product-coded streams. The product-code consists of Turbo-codes or Reed–Solomon codes which are optimized using an iterative process. The wireless channel used for the testing phase is a Rayleigh Fading channel with Additive White Gaussian Noise (AWGN) added as a noise component. In this paper we propose protection techniques for image transmission and compare the performance of various protection methods for all JPEG standards. The proposed image standard model was found to perform very well in protecting the images against quality degradation during transmission over wireless channels. The strength of the protection plays a large part in the protection of the image and should be chosen to suit the particular channel in use. The default protection also provides very strong protection for the user who does not wish to choose their own setting.

Keywords: JPEG, Source coding, Channel Coding, Additive White Gaussian Noise (AWGN).

1. INTRODUCTION

Wireless image transmission has been a very demanding feature in recent multimedia communications. However, a wireless environment is very prone to the fading phenomenon that hears a high error rate channel. The specific application of image transmission over wireless channels has deservedly attracted much attention since it requires not only careful design of the coding methodology for the compression of images, but also appropriate selection of the set of channel codes for effective forward error- correction. A variety of error resilient techniques [I, 2] employing product codes based on RCPC/CRC and RS codes for channel protection of other [3] streams have been recently proposed in the literature. In [41, a scheme based on Turbo-codes was presented which outperformed the method in [2] for image transmission over wireless channels. In [5] a real-time optimization algorithm was presented for the transmission of independently decodable packet streams over varying channels. The system utilizes the packetizationscheme of [6]. In [7] the system of [5] was improved by combining the product code scheme of [1]. The methodology in [8] takes into consideration the dependencies between information in the compressed stream in order to cluster dependent layers and protect them according totheir importance.

(2)

technique, and the final image improves with respect to PSNR or resolution as the codestream data bits reach the receiver side.

2. PROPOSED PROTECTION TECHNIQUE FOR THE JPWL STANDARD The entire process will follow a main flow as follows:

Fig.1: Block diagram of Encoder and Decoder

2.1 Image Encoder

Image encoder encodes the image intoblock coding of wavelet coefficients. The final bitstream is composed by a succession oflayers which include information from independent codeblocks since their decoding does not require prior decoding of other code blocks.

Subband 1

Subband 2

Subband N

Fig.2: Each subband forms a group of layers that can he independently protected and decoded.

One of our primary goals during the design and implementation ofthe system proposed in the present paper was the transmission of information in such a way so that the corrupted portion of information can be discarded without affecting the decodability of the rest of the information. For this reason, we propose the division of the wavelet coefficients to be transmitted into N disjoint sets Jn, n=1,. . . ., N. in the wavelet domain so that

n

Jn

and

n

Jn

=W

Where W is the set including all the coefficients of the wavelet representation. If the disjoint sets of coefficients are channel-coded appropriately into channel packets. Then the erasure of a packet during transmission would not prevent the uncorrupted information from being decoded. Although numerous combinations of disjoint sets of coefficients can he conceived. In practice, since blockwise coding is performed. the subbands of the wavelet

Image encoder Error Protection

encoder

Error prone Wireless

channel

Image decoder Error Protection

decoder

1      3 

2      4       N‐2 

 

(3)

decomposition were chosen in the present paper as a reasonable compromise (see Fig.1 ) between coding efficiency and information decoupling

.

2.2 Error Protection encoder and Decoder

The error protection encoder and decoder consist in techniques to protect a codestream against transmission errors as shown in below

Fig.3: Arrangement of data in Channel-coded row

Fig.4; Product code based on Turbo codes and RS codes

The residual errors descriptor specifies the locations of residual errors in the codestream. The residual errors are the errors which cannot be corrected by the error protection decoder. This information is typically generated during the error protection decoding process. This information can subsequently be used in the image decoder to prevent decoding corrupted portions of the stream.

3. CHANNEL RATE ALLOCATION

Since the bitstreams that are generated by image consist of layers with Unequal importance, UEPshould generally be applied for their efficient protection from channel errors. The proposed UEP algorithm takes into account the importance of each packet and allocates more channel symbols (Turbo code bytes and Reed- Solomon symbols) to packets cawing important information and fewer to other packets, in this way, packets that contribute with higher distortion improvement tothe eventual image quality are better protected than the rest. The problem formulated as above can be solved optimally under a specific target rate constraint by

Packet 1

Packet 2

   

Info CRC Parity1 Parity2

Subband 1 

FEC      Subband 2 

FEC      FEC         Subband 2 

FEC         FEC      FEC     Subband 3 

:      :      :       : 

FEC      FEC      FEC        FEC      Subband N 

CRC 

CRC 

CRC 

CRC 

CRC 

CRC 

Turbo Coder 

Turbo Coder 

Turbo Coder 

Turbo Coder 

Turbo Coder 

Turbo Coder 

       

s

 

1 

  

      

 

c

 

1 

      

r

 

2      

s

 

2       

c

(4)

Packet 3

: : :

Packet N

Fig.5. Location of RS bytes. Source bytes and Turbo code bytes

Horizontal and vertical direction, the beginning of the first source byte in a packet is placed immediately after the last RS symbol On the other hand; the Turbo-code stream begins after the last source symbol. Specifically. We assume that in the nth, row of the product code array. There

(1)

are rnRS symbols, snsource bytes and cn Turbo-code bytes. The resulting product code array is schematically shown in Fig. 2. The transmission of each packet in Fig. 2stimulates a reduction in the average (expected) distortion of the image reconstructed after transmission. Since transmitted packets are independent of each other, the eventual distortion reduction D is the cumulative sum of the reductions achieved by the transmission of each packet separately, i.e.

Where Dnis the average distortion reduction caused by the transmission of the nthpacket. Our intention is to determine the optimal rn, sn, cnfor n= 1,. . . , N by maximization of the average distortion reduction D subject to the constraint

n n n n n n

r

  

s

c

Rp

 

s

Rp r

 

c

for

n

1,2....

N

(2)

Where Rp Rs c N

 In order to simplify our optimization task, we make two assumptions regarding the allocation of

channel rate. The expected distortion depends on the number of packets that are erased during transmission. In practice, an erasure occurs when the Turbo decoder is unable to recover the information in a corrupted packet. The average distortion reduction caused by the transmission ofthe nth packet is given by

Dn

 

(1

p c

n

( )).

n

D s

n

( )

n

P c Dn

n

( ).

n (3)

Then the average distortion reduction in thenth packet iscorrupted is

D n

1

1

( ).

(

N x n

)

N

x

Pe x Dn r

 

r

(4)

To gain insight regarding the term

D r

n

(

N x 1

r

n

)

assume that x packets are erased (see Fig. 6) during

transmission. This means that only the source symbols in product code columns in which there are at least x RS symbols can be recovered.Sincethe level of RS protection is monotonically non-decreasing with n, the portion of the stream that can be recovered is determined by the end of the RSstream in the N -x + 1 packet. Thus, in every column on the left of the axis in Fig. 6. there are at least x packets carrying RS symbols which guarantee the recovery of the erased information. The probability Pe(x) that exactly x packets, out of N packets in total. are erased depends on the number tj, j = 1,. . . , Q, of packets protected at the jthprotection level, where Q is the number of available Turbo protection levels.

      

r

 

N       

s

 

N      

c

 

N

1

N n

D

D n

(5)

         

1

1 2

1 2

1 2 1

1

2

0 0 0

1 1

1

( )

...

( 1).

(

)..

...

(

).

Q Q Q u u u

e t t

x x x

Q

t Q Q l

l

p

x

p

x

P

x

P

x

P x

x

x

        

 

 

       (5)

Using (2).(3). and (4). and taking into consideration the fact that

D r

n

(

N x 1

r

n

)

is zero.

|

Packet 1 Packet 2

:

:

Packet N

Correctable bitstream

| Uncorrectable bitstream

Erased Packet Undecodable Source Turbo Protection Symbols Symbols Correctly received Decodable Source Reed Solomon Packet Symbols

Symbols

Fig.6: When xpackets are erased. the correctable portion of the bitstream lies on the left of the axis defined by the end of the RSstream in the N - x+ 1 packet (since symbols in this stream are protected by at least x RSsymbols). Information symbols that lie on the right of the axis are decodable only if they are part of uncorrupted packets.

N+1-n, then eq(1) will be

1

{

N n

D

(1

p c Dn R r c

n

( )).

n

(

p

  

n n

)

1

1

( ).

(

( ).

(

N x

))}

N n

n n e n n

x

p c

p x D r

 

r

(5) Our intention is to maximize the distortion reduction given by (5). For the efficient solution of the optimization problem, a two-stage procedure is followed first the RS code is kept constant and the Turbo-code stream is

(6)

optimized. Subsequently. The Turbo rate-allocation determined in the previous step is kept constant and the RS stream is optimized. The above procedure is repeated several times until convergence. In particular, the Turbo optimization problem is treated by exhaustive search among the allowable combinations. Since the RS rate is monotonically nonincreasing with n, the RS rate-allocation problem is tackled using a fast, packet-wise bisection procedure which calculates. for the nth packet, the optimal length of the RS stream in the allowable range

1 1

[

r

n

,

r

n

]

. It should be noted that since the appropriate amounts of RS and Turbo protection are determined using a two-step process, and not jointly, the above procedure does not guarantee global optimization. In practice, however, the proposed allocation algorithm yields very satisfactory results.

4. QUALITY TESTING

 

The PSNR is defined at (Peak signal-to-noise ratio) as:

2

(

)

10 log10

Max

i

PSNR dB

MSE

MAXi is the maximum value a pixel can take in the image. A standard grayscale will have an 8 bit resolution with a maximum value of 255.

The MSE is defined as:

2 1 1

0 0

1

( , )

( , )

m n i j

MSE

I i j

K i j

mn

 

 



It can be seen from the equations that a larger PSNR value indicates a better image quality

.

5. RESULTS AND DISCUSSION

The packet protection of the proposed standard will provide us with the best indication of the performance of the standard. In the event that the header fails to be properly protected, the image will fail to decode and as such the packet protection be completely irrelevant. The first set of results that will be investigated are those which left the data sensitivity and addressing mode as the defaults for the Open JPEG codec.

5.1 Table: For Lena Image

SNR PSNR (JPEG)

PSNR (Proposed)

9 0 0

12 0 0

15 0 14.616

18 0 13.64

21 7.108 17.387

24 14.543 17.78

27 13.534 24.682

30 13.018 28.666

33 17.358 31.582

36 33.981 37.92

39 67.676 43.167

42 71.504 49.857

(7)

(a)       (b) (c)

Fig.7 (a) Input lena Image (b) JPEG Protected Image and (c) Proposed Protected Image

5 10 15 20 25 30 35 40 45 0

10 20 30 40 50 60 70 80

SNR(dB)

P

S

NR(

d

B

)

JPEG protection of lena image SNR Vs PSNR(dB)

JPEG protection

5 10 15 20 25 30 35 40 45 0

10 20 30 40 50 60

SNR(dB)

P

S

NR(

d

B

)

proposed protection of lena image SNR Vs PSNR(dB)

Lena-proposed protection

(a) (b)

(8)

0 5 10 15 20 25 30 35 10-4

10-3 10-2 10-1 100

SNR=Eb/No(dB)

B

ER

/SER

Simulation of BER/SER for QPSK with Gray coding( Rayleigh multipath and AWGN)

BER-simulated SER-simulated

20 40 60 80 100 120 140 160 180 200 -30

-25 -20 -15 -10 -5 0 5 10

Rayleigh Fading Envelope(variance=0.5)

symbols

A

m

pli

tud

e/

RM

S

(dB

)

(a) (b)

Fig.9: (a) simulation for QPSK in Rayleigh Fading Channel and (d) Its Fading Envelope performance

6. CONCLUSIONS

 

A novel method was proposed for the communication of images over wireless channels. The proposed protection standard model performed very well at protecting the images codestream from a large array of error levels. It would be useful for anyone wanting to implement wireless stream of images. It also exploits the block-based structure of the image streams and employs product codes consisting of Turbo codes and erasure-correction codes in order to deal effectively with burst errors. A framework for the optimal unequal error protection was also proposed. Performance evaluation showed the superiority of the proposed scheme in comparison to well-known wireless transmission schemes.

REFERENCES:

[1] G. Sherwood and K. Zeger, “Error Protection for Progressive h a w Transmission Over Memoryless and Fading Channel? IEEE Trans. Communications, vol. 46, no. 12, pp.1555-1559, Dec. 1998.

[2] D.G.Sachs. A. Raghavan, and K. Ramchandran. ”Wireless image transmission using multiple-description based concatenated codes,” in Dora Compression Conference, 2000.

[3] A. Said and W. A. Pearlman,”A New Fast and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees;’ IEEE Trans. CircuitsSyst. Video TEchnol.,vol. 6, pp. 243- 250, June 1996.

[4] N. Thomos, N. V. Boulgouris, and M. G. Strintzis. “Wireless Image Transmission Using Turbo Codes and Optimal Unequal Error Protection:’ in Proc. IEEE Int. Conference on Image Processing, Barcelona. Spain. Sep. 2003.

[5] V. Stankovic, R. Hamzaoui, and Z. Xiong, “Fast forward error protection algorithms for transmission of packetized multimedia bitstreams over varying channels:’ in Proc. IEEE In: Conference on Communication,Anchorage, AK, May 2003.

[6] X. Wu, S. Cheng, and Z. Xiong, “on packetization of embedded multimedia bitstreams.’ IEEE Trans. Multimedia, vol. 3, no. 1, pp. 132-140, Mar. 2001.

[7] V. Stankovic, R. Hamzaoui, and Z. Xiong, “Product code error protection of packetized multimedia bitstreams:’ in on Image Processing Proc. IEEE In/. Conference, Barcelona, Spain. Sep. 2003.

References

Related documents

or scope essential to the analysis of the challenged practice. In the context of patent settlements this entails that the very questions that the parties were seeking to avoid

Since those standard entry control technique can't effectively fare thee well of the security issues that exist previously, data offering. Majority of the data

It is concluded from the study that abnormally elevated maternal serum beta HCG and maternal dyslipidemia in the early second trimester i.e.14-20 weeks of

In the second part of the paper I analyze expense ratio changes (repricing decisions) as a response to changes in the sensitivity of investors to fund performance and expenses and

Segment size and cost as a proportion of the total population; segment cost split by care type (NEIP: Non-elective inpatient; ELIP: Elective inpatient; OP: Outpatient; GP

Neonatal outcomes of deliveries in occiput posterior position when delayed pushing is practiced a cohort study RESEARCH ARTICLE Open Access Neonatal outcomes of deliveries in

However, this study found that the time given to Grains and Extras represented more than a third of the total time given to food references, while both the Fruits and Vegetables

The performance of distribution system has been demonstrated for neutral current compensation along with reactive power compensation, harmonic reduction and load