Novel Approach to Estimate Missing Data Using Spatio-Temporal Estimation Method
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
With advancement of wireless technology and the processing power in mobile devices, every handheld device supports numerous video streaming applications. Generally, user datagram protocol (UDP) is used in video transmission technology which does not provide assured quality of service (QoS). Therefore, there is need for video post processing modules for error concealments. In this paper we propose one such algorithm to recover multiple lost blocks of data in video. The proposed algorithm is based on a combination of wavelet transform and spatio-temporal data estimation. We decomposed the frame with lost blocks using wavelet transform in low and high frequency bands. Then the approximate information (low frequency) of missing block is estimated using spatial smoothening and the details (high frequency) are added using bidirectional (temporal) predication of high frequency wavelet coefficients. Finally inverse wavelet transform is applied on modified wavelet coefficients to recover the frame. In proposed algorithm, we carry out an automatic estimation of missing block using spatio-temporal manner. Experiments are carried with different YUV and compressed domain streams. The experimental results show enhancement in PSNR as well as visual quality and cross verified by video quality metrics (VQM).
Authors and Affiliations
Aniruddha Shelotkar, Dr. P. Ingole
Harmonics Measurement in Computer Laboratory and Design of Passive Harmonic Filter using MATLAB
In this paper the harmonics measurement for computer loads is analyzed and passive filters are designed for mitigating those harmonics. The filters are designed to meet the IEEE standard 519-1992 which is recommended for...
Phishing Websites Detection using Machine Learning
Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished...
Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning
This paper presents a new framework for adding semantics into e-learning system. The proposed approach relies on two principles. The first principle is the automatic addition of semantic information when creating t...
A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks
Software-Defined Networks have seen an increas-ing in their deployment because they offer better network manageability compared to traditional networks. Despite their immense success and popularity, various security issu...
BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra
New terms such as closest vector problem (CVP) and the shortest vector problem (SVP), which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain...