Transmission policy selection for multi-view content delivery over bandwidth constrained channels

Research output: Contribution to journalArticlepeer-review

16 Scopus citations

Abstract

I formulate an optimization framework for computing the transmission actions of streaming multi-view video content over bandwidth constrained channels. The optimization finds the schedule for sending the packetized data that maximizes the reconstruction quality of the content, for the given network bandwidth. Two prospective multi-view content representation formats are considered: 1) MVC and 2) video plus depth. In the case of each, I formulate directed graph models that characterize the interdependencies between the data units that comprise the content. For the video plus depth format, I develop a novel space-time error concealment strategy that reconstructs the missing content based on received data units from multiple views. I design multiple techniques to solve the optimization problem of interest, at varying degrees of complexity and accuracy. In conjunction, I derive spatiotemporal models of the reconstruction error for the multi-view content that I employ to reduce the computational requirements of the optimization. I study the performance of my framework via simulation experiments. Significant gains in terms of rate-distortion efficiency are demonstrated over various reference methods.

Original languageEnglish (US)
Article number6677586
Pages (from-to)931-942
Number of pages12
JournalIEEE Transactions on Image Processing
Volume23
Issue number2
DOIs
StatePublished - Feb 2014
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Graphics and Computer-Aided Design

Keywords

  • MVC
  • Multi-view video
  • depth-image-based rendering
  • interactive multi-view video streaming
  • packet scheduling
  • policy selection
  • rate-distortion optimization
  • video plus depth

Fingerprint

Dive into the research topics of 'Transmission policy selection for multi-view content delivery over bandwidth constrained channels'. Together they form a unique fingerprint.

Cite this