Wireless Video Transmission

Wireless Video Transmission

Supavadee Aramvith (Chulalongkorn University, Thailand) and Rhandley D. Cajote (Chulalongkorn University, Thailand)
Copyright: © 2009 |Pages: 30
DOI: 10.4018/978-1-60566-262-6.ch012
OnDemand PDF Download:
$37.50

Abstract

Presently, both wireless communications and multimedia communications have experienced unequaled rapid growth and commercial success. Building on advances of network infrastructure, low-power integrated circuits, and powerful signal processing/compression algorithms, wireless multimedia services to support digital video applications such as videophone, video conferencing, video streaming, video on demand (VoD), and video surveillance, likely finds widespread acceptance. Many wireless multimedia applications require video coding schemes and underlying transport that can provide acceptable quality of service to the end users. Due to the burst errors nature of wireless channels and the error propagation property of compressed video, suitable source and channel coding schemes are required to handle such conditions. This chapter provides overview of video compression techniques, and the latest video coding standard, H.264/AVC, its implication for the wireless video transmission, and our research contribution on joint source-channel coding for wireless video transmission.
Chapter Preview
Top

Introduction

Multimedia is defined as media that utilizes a combination of different content forms (http://en.wikipedia.org/wiki/Multimedia). Those forms are regarded as text, audio, still images, animation, video, and interactivity. To exchange those data among humans or among humans and machines, the field “multimedia communication” is established. Multimedia communication refers to the representation, storage, retrieval, distribution of machine-processable information expressed in multiple media. It can be divided according to the type of media such as data, text, audio, image and video communications. Some example applications are data transfer and fax. For audio communication example applications are telephony and sound broadcasting. For video communication example applications are video conferencing, television, and high-definition television.

The elements of multimedia communication system are divided into person-to-person and person-to-machine communication. Person-to-person communications are systems where humans are the end users of the system connected through telecommunication networks. This kind of system enables interactive and real-time multimedia data to flow between parties. Examples are MSN messaging, Skype, and video conferencing system. Another kind of system is a person-to-machine communications where humans interact with computer servers such as music server, video server, or a simple text information server. The computer servers perform the task of processing, storage, and retrieval of multimedia data. The example scenario is when users browse through the web page and decide to stream the video clips to their computer terminals. To develop such a system, careful considerations should be taken into account; those include users and network requirements and specification of multimedia terminals. From the user’s point of view, the capabilities of dynamically controlling the multimedia information in terms of connection interaction, quality on demand, and friendly user interfaces are important as well as the ability to prepare and present different multimedia information according to time budget constraints and available terminal resources. Standardization of multimedia representation is also a necessary component in multimedia services. The key requirements of new multimedia services would involve instant availability, real-time information transfer, and universal access from any terminal. The network technology needs to be continuously developed to support high speed, varying bit rates and the ability to synchronize different types of information. In the end, there are still many issues that need to be addressed in developing multimedia terminals: basic techniques for compression and coding various multimedia data, basic techniques for organizing, storing, and retrieving multimedia signals, basic technique for accessing, searching and browsing individual multimedia documents.

In the above mentioned digital multimedia content, speech, audio, and video are the most widely researched in terms of applications areas such as internet telephony, streaming video and audio, digital audio and video broadcasting, etc. Nevertheless, the bit rate required to make such applications possible ranges from the order of kilobits for speech to gigabits for video. Thus to realize these, a lot of research and standardization effort have been aimed at the efficient transmission of these digital multimedia content. The signal processing community has devoted a lot of effort in developing efficient multimedia source coding techniques. The communication community has also devoted efforts in terms of channel coding techniques and efficient method of multimedia transmission and distribution. Nevertheless, joint efforts from research communities are presented today. From all the forms of digital multimedia content, video plays an increasingly important role as the emerging multimedia communication and distribution system. Regardless of its extremely large size that makes it more difficult to find effective schemes to compress and transmit flawlessly through IP and wireless medium.

In this chapter, we discuss the video compression techniques, and the latest video coding standard, H.264/AVC, its implication for the wireless video transmission, and our research contribution on joint source-channel coding for wireless video transmission.

Key Terms in this Chapter

ARQ: Automatic Repeat Request, a system of transmission protocols for error control.

PSNR: Peak Signal to Noise Ratio, a measure of signal fidelity by computing the ratio the peak signal power and the corrupting noise power.

MPEG-4 Part 10: The same as H.264.

LCR: Level Crossing Rate, the rate (or frequency) that a fading signal crosses a specified threshold in the positive going direction.

FEC: Forward Error Correction, system of error control schemes for data transmission which adds redundant information in order to provide robustness to channel errors.

H.264/AVC: ITU-T: Standard for advanced video coding, also known as MPEG-4 Part 10.

ADF: Average Duration of Fade, the average amount of time that a fading signal stays below a specified threshold.

BER: Bit Error Rate, the percentage of bits that have errors relative to the total number of bits received during transmission.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Foreword
Borko Furht
Preface
Shiguo Lian, Yan Zhang
Acknowledgment
Shiguo Lian, Yan Zhang
Chapter 1
Pramod A. Jamkhedkar, Gregory L. Heileman
Rights expression languages (RELs) form a central component of digital rights management (DRM) systems. The process of development of RELs... Sample PDF
Rights Expression Languages
$37.50
Chapter 2
Deepali Brahmbhatt, Mark Stamp
This chapter presents a digital rights management (DRM) system designed for streaming media. A brief, general introduction to DRM is also provided... Sample PDF
Digital Rights Management for Streaming Media
$37.50
Chapter 3
Jean-Henry Morin
This chapter introduces and discusses much needed alternatives to the traditional either/or debate on total security of secure multimedia... Sample PDF
Rethinking DRM Using Exception Management
$37.50
Chapter 4
Mercè Serra Joan, Bert Greevenbosch, Anja Becker, Harald Fuchs
This chapter gives an overview of the Open Mobile AllianceTM Digital Rights Management (OMA DRM) standard, which allows for the secure distribution... Sample PDF
Overview of OMA Digital Rights Management
$37.50
Chapter 5
Hugo Jonker, Sjouke Mauw
The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider, and the user... Sample PDF
Discovering the Core Security Requirements of DRM Systems by Means of Objective Trees
$37.50
Chapter 6
Pallavi Priyadarshini, Mark Stamp
Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and... Sample PDF
Digital Rights Management for Untrusted Peer-to-Peer Networks
$37.50
Chapter 7
L. Badia, A. Erta, U. Malesci
Traditional analog video surveillance systems technology has recently become inadequate to face the massive demand of security systems consisting of... Sample PDF
Pervasive Video Surveillance Systems Over TCP/IP Networks
$37.50
Chapter 8
Ramya Venkataramu, Mark Stamp
Digital Rights Management (DRM) technology is used to control access to copyrighted digital content. Apple employs a DRM system known as Fairplay in... Sample PDF
P2PTunes: A Peer-to-Peer Digital Rights Management System
$37.50
Chapter 9
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
This chapter advocates the convergence between Access Control (AC) models, focusing on the granularity of sharing, and Digital Right Management... Sample PDF
A Hardware Approach for Trusted Access and Usage Control
$37.50
Chapter 10
Ionut Florescu
Regarding fundamental protocols in cryptography, the Diffie-Hellman (Diffie and Hellman, 1976) public key exchange protocol is one of the oldest and... Sample PDF
A Summary of Recent and Old Results on the Security of the Diffie-Hellman Key Exchange Protocol in Finite Groups
$37.50
Chapter 11
Guojun Wang, Yirong Wu, Geyong Min, Ronghua Shi
Secret sharing aims at distributing and sharing a secret among a group of participants efficiently. In this chapter, we propose a plane-based access... Sample PDF
Secret Sharing with k-Dimensional Access Structure
$37.50
Chapter 12
Supavadee Aramvith, Rhandley D. Cajote
Presently, both wireless communications and multimedia communications have experienced unequaled rapid growth and commercial success. Building on... Sample PDF
Wireless Video Transmission
$37.50
Chapter 13
M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza
Establishing hidden communication is an important subject of discussion that has gained increasing importance recently, particularly with the... Sample PDF
A Survey of Information Hiding
$37.50
Chapter 14
Fan Zhang
The digital multimedia, including text, image, graphics, audio, video, and so forth, has become a main way for information communication along with... Sample PDF
Digital Watermarking Capacity and Detection Error Rate
$37.50
Chapter 15
Digital Watermarking  (pages 277-297)
Aidan Mooney
As Internet usage continues to grow, people are becoming more aware of the need to protect the display and presentation of digital documents.... Sample PDF
Digital Watermarking
$37.50
Chapter 16
Pradeep K. Atrey, Abdulmotaleb El Saddik, Mohan Kankanhalli
Digital video authentication has been a topic of immense interest to researchers in the past few years. Authentication of a digital video refers to... Sample PDF
Digital Video Authentication
$37.50
Chapter 17
Tieyan Li
The multimedia community is moving from monolithic applications to more flexible and scalable proliferate solutions. Security issues such as access... Sample PDF
Flexible Multimedia Stream Authentication
$37.50
Chapter 18
K-G Stenborg
Media that is distributed digitally can be copied and redistributed illegally. Embedding an individual watermark in the media object for each... Sample PDF
Scalable Distribution of Watermarked Media
$37.50
Chapter 19
Hafiz Malik
This chapter provides critical analysis of current state-of-the-art in steganography. First part of the this chapter provides the classification of... Sample PDF
Critical Analysis of Digital Steganography
$37.50
Chapter 20
Esther Palomar, Juan M.E. Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Perhaps the most popular feature offered by Peer-to-Peer (P2P) networks is the possibility of having several replicas of the same content... Sample PDF
Secure Content Distribution in Pure P2P
$37.50
Chapter 21
Andreas U. Schmidt, Nicolai Kuntze
Security in the value creation chain hinges on many single components and their interrelations. Trusted Platforms open ways to fulfil the pertinent... Sample PDF
Trust in the Value-Creation Chain of Multimedia Goods
$37.50
Chapter 22
Goo-Rak Kwon, Sung-Jea Ko
The objective of this chapter introduces an advanced encryption of MP3 and MPEG-4 coder with a quality degradation-based security model. For the MP3... Sample PDF
Copyright Protection of A/V Codec for Mobile Multimedia Devices
$37.50
Chapter 23
Frank Y. Shih, Yi-Ta Wu
Steganography is the art of hiding secret data inside other innocent media file. Steganalysis is the process of detecting hidden data which are... Sample PDF
Digital Steganography Based on Genetic Algorithm
$37.50
Chapter 24
Guangjie Liu, Shiguo Lian, Yuewei Dai, Zhiquan Wang
Image steganography is a common form of information hiding which embeds as many message bits into images and keep the introduced distortion... Sample PDF
Adaptive Image Steganography Based on Structural Similarity Metric
$37.50
Chapter 25
Shiguo Lian
Video watermarking technique embeds some information into videos by modifying video content slightly. The embedded information, named watermark, may... Sample PDF
A Survey on Video Watermarking
$37.50
Chapter 26
Minglei Liu, Ce Zhu
Digital watermarking is a useful and powerful tool for multimedia security such as copyright protection, tamper proofing and assessment, broadcast... Sample PDF
Multiple Description Coding with Application in Multimedia Watermarking
$37.50
Chapter 27
Hsuan T. Chang, Chih-Chung Hsu
This chapter introduces a pioneer concept in which multiple images are simultaneously considered in the compression and secured distribution... Sample PDF
Fractal-Based Secured Multiple-Image Compression and Distribution
$37.50
About the Contributors