2018
DOI: 10.1109/tcsvt.2017.2686647
|View full text |Cite
|
Sign up to set email alerts
|

Checksum-Filtered List Decoding Applied to H.264 and H.265 Video Error Correction

Abstract: The latest video coding standards, H.264 and H.265, are highly vulnerable in error-prone networks. Reconstructed packets may exhibit significant degradation in terms of PSNR and visual quality. This paper presents a novel list decoding approach exploiting the receiver side user datagram protocol (UDP) checksum. The proposed method identifies the possible locations of errors by analyzing the pattern of the calculated UDP checksum. This permits to considerably reduce the number of candidate bitstreams in compari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

5
2

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…The experimental results for H.264 reveal the superiority of the proposed approach as compared to other state-of-the-art methods [9], [21]. Finally, a detailed study of multiple bits in error with new experimental results for both H.264 and HEVC is the object of a submitted publication [22].…”
Section: Introductionmentioning
confidence: 91%
“…The experimental results for H.264 reveal the superiority of the proposed approach as compared to other state-of-the-art methods [9], [21]. Finally, a detailed study of multiple bits in error with new experimental results for both H.264 and HEVC is the object of a submitted publication [22].…”
Section: Introductionmentioning
confidence: 91%
“…Several works have explored the error correction possibilities of error detection codes, such as CRC [8]- [16] or checksums [20]. They can be categorized as table-based and table-free approaches.…”
Section: Related Workmentioning
confidence: 99%
“…In order to further increase the proposed method's error correction performance, it can be jointly used with other methods providing a list of potential error patterns as their output. For example, the work on UDP checksum proposed in [9], [26], [27] can be combined with our algorithm. Crosschecking both candidate lists would generate a matching list with a reduced number of entries.…”
Section: E Future Workmentioning
confidence: 99%