Multidimensional Layered Forward Error Correction using Rateless Codes

Similar documents
Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet

One-pass bitrate control for MPEG-4 Scalable Video Coding using ρ-domain

Recommended Readings

MULTI-BUFFER BASED CONGESTION CONTROL FOR MULTICAST STREAMING OF SCALABLE VIDEO

Raptor Codes for P2P Streaming

Optimal Estimation for Error Concealment in Scalable Video Coding

Wireless Video Transmission: A Single Layer Distortion Optimal Approach

ESTIMATION OF THE UTILITIES OF THE NAL UNITS IN H.264/AVC SCALABLE VIDEO BITSTREAMS. Bin Zhang, Mathias Wien and Jens-Rainer Ohm

Adaptation of Scalable Video Coding to Packet Loss and its Performance Analysis

Module 6 STILL IMAGE COMPRESSION STANDARDS

ERROR-ROBUST INTER/INTRA MACROBLOCK MODE SELECTION USING ISOLATED REGIONS

Distributed Rate Allocation for Video Streaming over Wireless Networks. Wireless Home Video Networking

The Performance of MANET Routing Protocols for Scalable Video Communication

AL-FEC for Streaming Services over LTE Systems

Effective Relay Communication for Scalable Video Transmission

Publication Institute of Electrical and Electronics Engineers (IEEE)

Transmission Control for Fast Recovery of Rateless Codes

Unit-level Optimization for SVC Extractor

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)

Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction

A COST-EFFICIENT RESIDUAL PREDICTION VLSI ARCHITECTURE FOR H.264/AVC SCALABLE EXTENSION

A Case Study on Cloud Based Hybrid Adaptive Mobile Streaming: Performance Evaluation

Sliding-window Raptor codes for Efficient Scalable Wireless Video Broadcasting with Unequal Loss Protection

Fountain Codes Based on Zigzag Decodable Coding

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE

Receiver-based adaptation mechanisms for real-time media delivery. Outline

Optimum Quantization Parameters for Mode Decision in Scalable Extension of H.264/AVC Video Codec

Multi-path Forward Error Correction Control Scheme with Path Interleaving

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS

Cross-Layer Optimization for Efficient Delivery of Scalable Video over WiMAX Lung-Jen Wang 1, a *, Chiung-Yun Chang 2,b and Jen-Yi Huang 3,c

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

ADAPTIVE JOINT H.263-CHANNEL CODING FOR MEMORYLESS BINARY CHANNELS

MCTF and Scalability Extension of H.264/AVC and its Application to Video Transmission, Storage, and Surveillance

Video Redundancy Coding in H.263+ Stephan Wenger Technische Universität Berlin

For layered video encoding, video sequence is encoded into a base layer bitstream and one (or more) enhancement layer bit-stream(s).

An Experimental Study of Packet Loss and Forward Error Correction in Video Multicast over IEEE b Network

ARCHITECTURES OF INCORPORATING MPEG-4 AVC INTO THREE-DIMENSIONAL WAVELET VIDEO CODING

Scalable Video Coding

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014

Comparison of Shaping and Buffering for Video Transmission

Packet-Level Forward Error Correction in Video Transmission

First-order distortion estimation for efficient video streaming at moderate to high packet loss rates

1094 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 11, NO. 6, OCTOBER 2009

BATS: Achieving the Capacity of Networks with Packet Loss

EE Low Complexity H.264 encoder for mobile applications

Homogeneous Transcoding of HEVC for bit rate reduction

Lec 19 - Error and Loss Control

Performance Comparison between DWT-based and DCT-based Encoders

Is Physical Layer Error Correction sufficient for Video Multicast over IEEE g Networks?

Robust Video Coding. Heechan Park. Signal and Image Processing Group Computer Science Department University of Warwick. for CS403

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Improving Interactive Video in Wireless Networks Using Path Diversity 1

Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction

Scalable Extension of HEVC 한종기

idash: improved Dynamic Adaptive Streaming over HTTP using Scalable Video Coding

H.264/AVC und MPEG-4 SVC - die nächsten Generationen der Videokompression

Network Image Coding for Multicast

Bit Allocation for Spatial Scalability in H.264/SVC

Low-delay Peer-to-Peer Streaming using Scalable Video Coding

An Unequal Packet Loss Protection Scheme for H.264/AVC Video Transmission

Error Resilient Image Transmission over Wireless Fading Channels

Lecture 5: Error Resilience & Scalability

Fast Decision of Block size, Prediction Mode and Intra Block for H.264 Intra Prediction EE Gaurav Hansda

Cross Layer Protocol Design

Combined Copyright Protection and Error Detection Scheme for H.264/AVC

Motion Estimation. Original. enhancement layers. Motion Compensation. Baselayer. Scan-Specific Entropy Coding. Prediction Error.

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

1698 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER 2008

Investigation of the GoP Structure for H.26L Video Streams

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

Error Concealment Used for P-Frame on Video Stream over the Internet

Reduced Frame Quantization in Video Coding

Energy Savings for Video Streaming Using Fountain Coding

Performance Analysis of DIRAC PRO with H.264 Intra frame coding

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks

Reliable Multicasting over LTE: A Performance Study

Enabling Adaptive Video Streaming in P2P Systems

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks

EFFICIENT PU MODE DECISION AND MOTION ESTIMATION FOR H.264/AVC TO HEVC TRANSCODER

FAST SPATIAL LAYER MODE DECISION BASED ON TEMPORAL LEVELS IN H.264/AVC SCALABLE EXTENSION

Coding theory for scalable media delivery

STUDY AND IMPLEMENTATION OF VIDEO COMPRESSION STANDARDS (H.264/AVC, DIRAC)

Layered Multicast with Forward Error Correction (FEC) for Internet Video

Internet Engineering Task Force (IETF) Request for Comments: M. Luby Qualcomm Incorporated August 2012

BANDWIDTH-EFFICIENT ENCODER FRAMEWORK FOR H.264/AVC SCALABLE EXTENSION. Yi-Hau Chen, Tzu-Der Chuang, Yu-Jen Chen, and Liang-Gee Chen

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Quality of Service (QoS) Whitepaper

High-Performance H.264/SVC Video Communications in e Ad Hoc Networks

FPGA IMPLEMENTATION OF BIT PLANE ENTROPY ENCODER FOR 3 D DWT BASED VIDEO COMPRESSION

ERROR-RESILIENT TRANSMISSION OF H.264 SVC STREAMS OVER DVB-T/H AND WIMAX CHANNELS WITH MULTIPLE DESCRIPTION CODING TECHNIQUES

Image and Video Coding I: Fundamentals

Proposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions

A Framework for Video Streaming to Resource- Constrained Terminals

Complexity Reduced Mode Selection of H.264/AVC Intra Coding

Multi-path Transport of FGS Video

MITIGATING THE EFFECT OF PACKET LOSSES ON REAL-TIME VIDEO STREAMING USING PSNR AS VIDEO QUALITY ASSESSMENT METRIC ABSTRACT

Transcription:

Multidimensional Layered Forward Error Correction using Rateless Codes Cornelius Hellge, Thomas Schierl, and Thomas Wiegand Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institut, D-587 Berlin, Germany hellge@hhi.de, schierl@hhi.de, wiegand@hhi.de Abstract Modern layered or scalable video coding technologies generate a video bit stream with various inter layer dependencies due to references between the layers. This work proposes a method for extending forward error correction (s) codes following dependency structures within the media. The proposed layer-aware (L-) generates repair symbols so that protection of less important dependency layers can be used with protection of more important layers for combined error correction. The L- approach is exemplary applied to rateless LT and Raptor codes. Gains for more important layers can be achieved without increasing the total code rate. The performance gain of the L- is shown by simulation results with receiver-driven layered multicast transmission using scalable video coding (SVC) with a Raptor-based L-. I. INTRODUCTION Media transmission is affected by information loss due to transmission errors on channels without Quality of Service (QoS). Due to the multifaceted dependency structure of modern video codecs like H.64/AVC or especially the scalable video coding extension of H.64/AVC (SVC) [], the effect of losses on the decoded video quality mainly depends on which parts of the video bit stream get lost. Forward error correction () technologies are typically used to reduce losses on multicast or broadcast channels without feedback. Many protection schemes have been proposed addressing this issue like unequal error protection (UEP) [] or priority encoding transmission (PET) [3]. Both examples give more protection to more important (lower) video layers. But first, the dependencyaware approach in [4] shows, that generating protection for less important (higher) layers over all depending layers can show an additional gain in protection for the referenced and more important layers. The proposed layer-aware (L-) approach additionally considers the presence of quality layers of a scalable video codec and the dependencies of multiple dimensions of quality. The results presented in this work show, that the L- approach can be very beneficial in transmission schemes, where multiple layers of a scalable video stream are transmitted separately and the protection must be independently decodable of different layers as e.g. in a receiver driven layered multicast (RLM) [5] scenario. Rateless codes have attracted attention during the last years. Some work was published using the Raptor as the most efficient rateless code, which has been recently adopted by 3GPP, 3GPP and DVB-H. In [6], the rateless behavior is used in a receiver driven scenario, where multiple servers help to overcome congestion problems in the network. Whereas in [7], the rateless codes are used in a peer-to-peer environment. II. TECHNICAL BACKGROUND A. Dependency Structures In Modern Video Codecs In modern video codecs, various dependency structures can be present. One important dependency structure is introduced by motion compensation, where a picture reference e.g. from the past is used to predict another picture. If a reference picture or a part of the reference picture is lost, the pictures using the reference are also affected. Therefore, the first picture in a sequence of pictures that references pictures from the past is the most important one. A loss of such a picture typically affects all succeeding pictures in some way. Hence, it is desirable to protect as many pictures as possible in such a chain of dependencies. Another set of dependency structures is introduced by the layered video coding of SVC, where a base layer is referenced by one or more enhancement layers. Such an enhancement layer can be further referenced by other enhancement layers and so on. Fig. depicts a simple dependency structure in a SVC media stream with successive dependency layers. Let l be the identifier of a layer out of to L, where l =is the base layer, l =identifies the first enhancement layer referencing the base layer and so on up to the highest layer l = L. In SVC, the loss of a layer x typically leads to corrupt decoding results for any layers l > x referencing x. SVC allows scalability dimensions as spatial (resolution), temporal (frame rate) or fidelity (SNR quality) scalability. A combination of those results into multidimensional dependency structures within the media bit stream. Other scalable dimensions like bit-depth scaling, or multi-view coding can add additional dependencies. B. Forward Error Correction Today s protection schemes do not take potentially multiple dependencies in (scalable) video bit streams into account. In existing schemes, typically for a number of k source symbols, a number of p = n k redundancy symbols are generated, where n is the code word length and p the number of redundancy or parity symbols. The code rate c of the resulting bit stream is defined by c = k n. Let us assume using an optimal code, i.e. each number of erasures of symbols smaller or equal

L- Not decodable L- L- L- L- L- L- L- L- L- L- L- L- L- L- ERROR L- L- L- Time = Time = t Time = t Fig.. Dependency structure of layered media coding to p can be recovered. Even, when using more redundancy symbols (stronger protection) for the more important layers like applied in UEP, there is no guarantee that in any error condition the reconstruction of relatively better protected layers is of higher probability than the reconstruction of less protected layers. If a lower layer is lost, higher enhancement layers cannot be decoded due to missing references as depicted in Fig.. In this example, layer is lost at time t due to transmission errors, so that layers with l> can not be decoded. Unlike using the proposed layer-aware approach, the successfully received redundancy symbols of the enhancement layers are useless. The rest of the paper is organized as follow. Section III describes the principles of layer-aware generation. The multidimensional layer-aware approach is outlined in section IV. After an introduction to rateless codes in section V we show the proposed layer-aware extension of such codes in section VI. In section VII, we show selected simulation results and conclude in section VIII with a summary and an outlook. III. PRINCIPLE OF LAYER-AWARE The idea of the layer-aware (L-) is to generate redundancy over layers in a media stream following existing dependencies. Resulting redundancy symbols in higher layers also protect lower layers and all redundancy symbols in the same dependency path can be used for combined error correction. A dependency path contains all dependent layers for decoding a particular layer in order of importance. Due to the additional dependencies of e.g. SVC, redundancy symbols of higher layers are useless without decoded lower layers. But with L-, these redundancy symbols can be used with the symbols of the lower layer for combined decoding. Fig. depicts the L- generation. After partitioning of the media bit stream into L quality layers, redundancy symbols ( ) of the lowest layer l =are generated by coding technique T. Considering existing dependency structure between layers, redundancy symbols of the enhancement layer l = x are calculated incorporating source symbols of all lower layers l<x.i.e.l- (layer l =) symbols are generated over source symbols of layer l =and layer l =. Furthermore, L- (layer l =) symbols are generated over source symbols Fig.. Time = Time = t Time = t Generation of L- over one dimension of dependency of layer l =, layer l =and layer l =and so on up to L- L, which is generated over source symbols of all layers l =to L. Note, that the total number of redundancy symbols remains constant and redundancy symbols of different layers but the same dependency path can be jointly used. IV. MULTIDIMENSIONAL L- The L- approach can be also extended to dependency structures in multiple dimensions of SVC. Fig. 3 depicts the generation of redundancy symbols along multiple dependency paths. There are three dependency dimensions, D,D,D 3, according to the temporal, spatial and fidelity dimensions in SVC. In each dimension D i, several layers l Di are present where the arrows represent the dependencies. In this example, each layer depends on all lower layers of the same dimension and partially on the layers of other dimensions. All redundancy symbols l D l D l D3 are generated over all depending layers. The redundancy symbols within a particular dependency path can be jointly used for correcting all source symbols of that path. The base layer, e.g., is included in all symbols. Hence, there are multiple paths where redundancy symbols can be jointly used for correcting errors in the base layer. In the one-dimensional case, as described in section III, the L- approach allows for the joint use of symbols within one dimension. That is,,, and can be jointly used for decoding source symbols in dimension D up to the maximum layer X used for generation. In the multidimensional case,,,,, and can be jointly used for correcting errors in all dimensions up to the maximum layer used for L- generation. V. RATELESS ERROR CORRECTION CODES A rateless or fountain code can produce a theoretical infinite number n of encoding symbols (ESs) from a limited number k of source symbols (SSs) with low complexity due to sparse coding matrices. For successful decoding, the number of received symbols, ES rec must fulfill equation (), where λ stands for the required decoding overhead in terms of symbols, which depends on the used technique T. ES rec λ(t ) k ()

Dimension (D) Fig. 3. D D D D D D Dimension (D ) Dimension3 (D 3 ) D3 D D D D Generation of L- over multiple dimensions of dependency The difficulty in designing rateless codes lies in developing methods for producing a theoretical infinite number of unique sets of XOR combinations P. I.e. the selection of the XOR combination sets shall provide a balance between source symbol coverage and sparse matrix allocation affecting the value of λ and coding complexity. First practical solution of rateless code was proposed in with the Luby Transform (LT) code [8]. The input data is divided in k source symbols, each of size t. Generation of ESs is done by computing for each encoding symbol ES i a different XOR combination out of d source symbols defined by the set P i. Here, the number of included source symbols d is called degree. Each set P i is randomly generated from a suitable degree distribution where i denotes the unique identification number (ESI) which is used as the seed for a pseudo-random generator for reconstructing the equation at the decoder. The ESI number is passed to the decoder along with the encoding symbol. The different XOR combination vectors P,,P n build the LT encoding matrix G LT which also appears as G LT in the matrix depicted in Fig. 4. Each ES i of matrix row and ESI number i is generated by XOR ing all SSs with a Boolean in the P i s.the complete encoding operation can be also expressed as: ES [:n ] = G LT ( : n ) SS [:k ] () At the receiver side, XOR combinations P i can be recovered by the ESIs i rec {,,n } of received encoding symbols ES rec. If the set of received encoding symbols results in at least k linear independent XOR combinations, k source symbols can be recovered by solving the resulting system of equations. For simulation results, we used the more efficient Raptor code proposed in [9]. The Raptor code increases the coding efficiency by concatenating the LT-code with an additional pre-code so that the coverage-constraint of the source symbols for LT encoding is softened and a sparser matrix G LT with lower degree d can be constructed. For simplification, we describe in section VI the layer-aware extensions of the LT code. Note, that this is also applicable on the Raptor code, because the code modifications are only applied to the LT generator matrix which is also included in the Raptor code generation. For detailed description of the Raptor code, we refer to []. VI. RATELESS L- To apply the L- approach with the LT-code, the encoding matrix G LT has to be modified for incorporating all dependency layers following the L- approach. The standard LT encoding matrix G LT has the dimension k n. To extend the XOR ing area of the matrix to lower layers and to keep the code rate constant, the generator matrix G LT m of layer m has to be extended over all SSs of lower layers l {,,m } to a ( m l= k l) n matrix G LayLT (m). This can be achieved by concatenating the encoding matrices G LT l of the lower layers with the encoding matrix G LT m of layer m: G LayLT (m) =[G LT G LT G LT m ] (3) This procedure allows the use of standard LT coding algorithms, which provide an efficient degree distribution. To avoid repeated XOR combinations P, the extension matrices G LT,,G LT (m ) are generated with unused ESI numbers. This is possible, since the theoretically unlimited number of producible encoding symbols. Fig. 4 depicts layered LT encoding matrices G LT and G LayLT () for exemplary two layers. Note that the proposed extension can be also applied to multiple layers and dimensions. For simplification but without the loss of generality, we show the matrix for one dimension and two layers only. Encoding symbols of layer l = are generated as defined by the standard LT code. The associated encoding matrix G LT corresponds to the standard encoding matrix, where each row consists of XOR ing sets P,,P n which are generated using ESI numbers i =,,n as random seeds. For the encoding symbol generation of layer l =, the standard matrix G LT is concatenated with matrix G LT. In the latter matrix, each XOR ing set P i is built with successive new ESI numbers i = P P P Pk- Pn- Pn Pn+ Pn+ Pn+k- Pn+n- Fig. 4. SSs Layer 3 k- k- G LT G LT* G LayLT () k k+ k+ k+3 k- k- G LT SSs Layer LT-Encoding matrix G LT and G LayLT () for two layers k- n- k- n- ESs Layer ESs Layer

Succesfully decoded [%] 8 6 4 Fig. 5. Layer : k=5 t=48; layer : k=6 t=48; test runs StandardRaptor LayeredRaptor 3 4 5 6 7 8 9 Available Remaining overhead [Symbols] Decoding probability using layer-aware vs. standard Raptor n,,n + n. L- encoding symbols for layer l =are calculated with: ES [:n ] = G LayLT ()( : n ) SS [:k ] (4) Thus the encoding symbols of layer l =represent XOR combinations of both layers. The encoding symbols can be furthermore used for decoding the lower layer l = following the L- approach. Compared to standard LT coding the number of output symbols n = n + n and the resulting bit rate remains constant. VII. SIMULATION RESULTS A. Performance of layer-aware Raptor The efficiency of a rateless code can be measured by the additional symbol overhead λ necessary for a successfull decoding process according to equation (). The following results show that the proposed modifications of Raptor code has the same or even a slightly better decoding probability than the standard Raptor code. For the simulations, the Raptor encoding software which refers to the proposed implementation in [] is extended to the L- approach. Two layers are created for comparison of the standard Raptor and the layer-aware Raptor code. Layer l = consists of k = 5 source symbols and the enhancement layer l =of k = 6 source symbols. The enhancement layer depends on the base layer. The source symbol size is t = 48 bytes. Additional redundancy symbols p are added to the Raptor fountain n = k + k + p. Furthermore, random packet losses are simulated over the entire bit stream. The available Raptor symbols are used for the decoding process. The X-axis in Fig. 5 shows the overhead in terms of available overhead symbols λ. The Y-axis show the percentage of simulation runs in case the lowest layer can be successfully decoded. In the StandardRaptor setting we simulated only the layer l =with p = additional redundancy symbols, i.e. the Raptor fountain consists in total of n = 6 symbols. The L- Raptor setting uses both layers, whereas the redundancy symbols are generated over layer l = and layer l =. In each simulation run 9 to symbols of the Raptor fountain are pseudo randomly lost and each simulation is performed times. The random seeds for both settings are identical. The simulation results are depicted in Fig. 5. The results show, that the layer-aware Raptor approach slightly increases the decoding probability of layer l =. The additional XOR connections in lower layers using the L- increase the source symbol coverage of the lower layers. Therefore the layer-aware approach increases the decoding probability and decreases the required overhead λ as similarly observed in []. B. Layer-aware Raptor in receiver-driven layered multicast In this section, we present selected results for video transmission in a simulated receiver-driven wireless multicast environment, where the protection is transmitted along with the source bits. A Gilbert-Elliot (GE) model is used as statistical model for simulation of burst losses in wireless channels [3], where the receiver is moving with a certain velocity. The media stream is mapped on transmission blocks (TBs) each of size 86 bytes. In the simulated GE model, we used an average error burst length of 5 TBs, whereas the loss rate in terms of TBs is varied throughout the simulation. The receivers are virtually connected to a wireless multicast channel, e.g. DVB-H, which provides multiple layers of different video qualities. Each client requests the scalable layers which provide either a signal that the device is capable or chooses to process. We present results for the SOCCER sequence at QVGA resolution, at maximum 3 frames per second and a duration of 6 seconds. The sequence is encoded using the SVC reference software JSVM 8.8 with a H.64 base layer at temporal resolution 7.5 Hz, a temporal enhancement layer at 3 Hz and one SNR fidelity enhancement layer. We used a group-of-picture (GOP) size of 6 and one I-frame at the beginning. We used combined temporal and fidelity scalability, which provides multiple quality layers over multiple dimensions of scalability, i.e. the operation points of the different layers are shown in Tab. I. Using these layers, we defined RLM settings with two and four quality layers (QL) which can e.g. be used for bit rate adaption. The settings are protected by two different systematic error protection schemes. The scheme provides equal protection for each layer in terms of code rate, whereas the UEP scheme uses an unequal error protection scheme, i.e. the code rate decreases or protection increases with increasing importance of a layer. The quality layer allocation schemes, the simulated code rates for each layer beginning from the left side with media layer and the resulting total bit rate are presented in Tab. II. Note, that each setting has in total the same bit rate. In the conducted simulations, we compared the proposed L- approach with the standard generation. Since the RLM approach requires independently decodable layers, using standard the redundancy for each layer is generated separately. The different generation for standard and layer-aware is shown in Fig. 6, i.e. the L- always incorporates all depending quality layers. The results of test runs are depicted in Fig. 7, where

TABLE I QUALITY POINTS OF LAYERED SVC STREAM Media layer Type Source rate Frame rate PSNR 3 SNR Enh. 96 kbps 3 Hz 36. db SNR Enh. 43 kbps 7.5 Hz 33.8 db Temp. Enh. kbps 3 Hz 3.9 db 3 kbps 7.5 Hz 33.6 db 37 36 35 34 33 SOCCER QVGA@3Hz GOP6 SVC Duration min GE Channel: Burst length 5 TB TB Size 86 Byte QL QL L QL UEP QL UEP L 4 QL 4 QL L 4 QL UEP 4 QL UEP L TABLE II PROTECTION SCHEMES Setting QL allocation Code rate Bit rate -QL- (+)/(+3).65/.65 75 kbps -QL-UEP (+)/(+3).6/.7 75 kbps 4-QL- ///3.65/.65/.65/.65 75 kbps 4-QL-UEP ///3.56/.63/.7/.77 75 kbps Mean PSNR [db] 3 3 3 9 8 7 the Y-axis shows the mean received video quality in terms of PSNR over different TB loss rates. Each setting has the same total bit rate and is affected by the same amount of errors, i.e. each setting uses the same seed for the random generator controlling the GE channel. In case of lost frames, we used a freeze frame error concealment, where the last decoded frame is repeated until the next frame is decodable. Note, that layer-aware Raptor is better or at least equal to the performance of the standard, i.e. the across layer generation follows existing dependencies. We used quality layer settings with and 4 QLs. In all settings the L- approach shows a better PSNR performance due to the additional protection from upper layers to lower layers, i.e. the base layer with standard has a lower protection as compared to the L-. The UEP schemes show the best performance for the standard and L- approach. Using the L-, the and UEP settings show a similar behavior. This is due to the combined decoding ability. The more QLs exist, the worser is the error robustness at lower loss rates. First at higher loss rates, e.g. at loss rate.35, the 4QL settings outperforms the QL settings. Similar results can be found in [4], where due to the higher number of QLs a gain can be observed first at a very high loss rate. VIII. CONCLUSION In this work, we propose the layer-aware (L-) approach. The L- generates redundancy symbols incorporating multidimensional dependency structures of quality layers in modern media codecs like H.64 SVC. The L- approach enhances the protection capability QLs 4 QLs.Enh. Layer.Enh. Layer Standard.Enh. Layer 3.Enh. Layer L- approach.enh. Layer.Enh. Layer L- L-.Enh. Layer L- 3 L-.Enh. Layer Fig. 6. Protection structure of layer-aware and standard over different numbers of quality layers 6.5..5..5.3.35.4 Mean TB loss rate Fig. 7. Simulation results for transmission of different layer and protection settings in a receiver-driven layered multicast scenario for the incorporated layers without increasing bit rate. We applied the L- approach to LT and Raptor code. Simulation results in a receiver driven layered multicast scenario show that L- approach shows a significant gain in terms of PSNR compared to a standard unequal error protection scheme. REFERENCES [] ITU-T and ISO/IEC JTC, Advanced video coding for generic audiovisual services, ITU-T Recommendation H.64 and ISO/IEC 4496- (AVC), Version 8 (including SVC extension), Jul. 7. [] B. Girod, U. Horn and B. Belzer, Scalable Video Coding With Multiscale Motion Compensation And Unequal Error Protection, in Proc. International Symposium on Multimedia Communications and Video Coding, New York, Oct. 995. [3] A. Albanese, J. Blomer, J. Edmonds, M. Luby and M. Sudan, Priority encoding transmission, IEEE Trans. on Information Theory, 4(6):737-744, 996. [4] A. Bouabdallah and J. Lacan, Dependency-aware unequal erasure protection codes, Journal of Zhejiang University SCIENCE A 6 7(Suppl. I):7-33. [5] S. McCanne, V. Jacobson and M. Vetterli, Receiver-driven layered multicast, In Proc. of ACM SIGCOMM 96, pages 7 3, Stanford, CA, Aug. 996. [6] J.-P. Wagner, J. Chakareski, and P. Frossard, Streaming of Scalable Video from Multiple Servers Using Rateless Codes, Proc. IEEE ICME, Toronto, Canada, July 6. [7] C. Wu and B. Li, rstream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes, IEEE Trans. on Parallel and Distributed Systems, Vol. 8, No., December 7. [8] M. Luby, LT-Codes, in Proceedings of the ACM Symposium on Foundation of Computer Science (FOCS),. [9] A. Shokrollahi, Raptor codes, Digital Fountain, Tech. Rep. DR3-6-, Jun. 3. [] M. Luby, M. Watson, T. Gasiba, T. Stockhammer and W. Xu, Raptor Codes for Reliable Download Delivery in Wireless Broadcast Systems, IEEE CCNC, Las Vegas, NV, Jan. 6. [] M. Bogino, P. Cataldi, M. Grangetto, E. Magli and G. Olmo, Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents, International Symposium on Circuits and Systems (ISCAS 7), USA, May 7. [] M. Luby, A. Shokrollahi, M. Watson and T. Stockhammer, Raptor Forward Error Correction Scheme for Object Delivery, draft-ietfrmt-bb-fec-raptor-object-9 (work in progress), Jun. 8, 7. [3] M. Hannuksela, V. Vadakital and S. Jumislo-Pyykk, Comparison of Error Protection Methods for Audio-Video Broadcast over DVB-H, EURASIP Journal on Advances in Signal Processing Volume 7, Arcticle ID 78, pages, 7.