Error concealment using refined boundary matching algorithm

Tao Chen, Ximin Zhang, Yun Qing Shi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations

Abstract

An adaptive technique is proposed for temporal error concealment based on the boundary matching algorithm. Previous approaches usually estimate only one motion vector for a damaged macroblock by minimizing the boundary difference. This may generate edge fragmentation, object deformation, and other noticeable artifacts, especially in damaged areas involving non-homogeneous motion. We present a framework of using various motion vectors for different regions within a damaged macroblock. The damaged macroblock is divided into small blocks, and each of the blocks is then concealed with an estimated motion vector. The estimation of motion vectors is independent, but constrained, in order to make it robust for concealment in different areas. A new matching criterion is developed in order to take into account possible edges on block boundaries. The advantage of the new algorithm has been shown by simulations.

Original languageEnglish (US)
Title of host publicationProceedings, ITRE 2003 - International Conference on Information Technology
Subtitle of host publicationResearch and Education
Pages55-59
Number of pages5
DOIs
StatePublished - 2003
Event2003 International Conference on Information Technology: Research and Education, ITRE 2003 - Newark, NJ, United States
Duration: Aug 11 2003Aug 13 2003

Publication series

NameProceedings, ITRE 2003 - International Conference on Information Technology: Research and Education

Other

Other2003 International Conference on Information Technology: Research and Education, ITRE 2003
Country/TerritoryUnited States
CityNewark, NJ
Period8/11/038/13/03

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Education

Keywords

  • Boundary matching
  • Error concealment

Fingerprint

Dive into the research topics of 'Error concealment using refined boundary matching algorithm'. Together they form a unique fingerprint.

Cite this