Optimal erasure protection strategy for scalably compressed data with tree-structured dependencies

Johnson Thie*, David Taubman

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
    33 Downloads (Pure)

    Abstract

    This paper is concerned with the transmission of scalably compressed data sources over lossy channels. Specifically, this paper is concerned with packet networks or, more generally, erasure channels. Previous work has generally assumed that the source elements form linear dependencies. The contribution of this paper is an unequal erasure protection algorithm which is able to take advantage of scalable data with more general dependency structures. In particular, the proposed scheme is adapted to data with tree-structured dependencies. The source elements are allocated to clusters of packets according to their dependency structure, subject to constraints on packet size and channel code-word length. Given a packet cluster arrangement, source elements are assigned optimal channel codes subject to a constraint on the total transmission length. Experimental results confirm the benefit associated with exploiting the actual dependency structure of the data.

    Original languageEnglish
    Pages (from-to)2002-2011
    Number of pages10
    JournalIEEE Transactions on Image Processing
    Volume14
    Issue number12
    DOIs
    Publication statusPublished - Dec 2005

    Bibliographical note

    Copyright 2005 IEEE. Reprinted from IEEE transactions on image processing, Volume 14, Issue 12, 2002-2011. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

    Fingerprint

    Dive into the research topics of 'Optimal erasure protection strategy for scalably compressed data with tree-structured dependencies'. Together they form a unique fingerprint.

    Cite this