Error concealment guided robustness
First Claim
1. A method of generating error correction for a video stream, the method comprising:
- identifying a current portion of a current video stream, the current portion having a feature;
identifying an estimated vulnerability metric based on a learned feature weight associated with the feature, the estimated vulnerability metric being a value based on comparing;
a first decoded portion of an encoded training portion of at least one training video stream, the encoded portion including the feature; and
a second decoded portion of the encoded training portion of the at least one training video stream, the second decoded portion based on the encoded training portion with a simulated transmission error; and
generating an error correction code for the current portion based on the estimated vulnerability metric.
2 Assignments
0 Petitions
Accused Products
Abstract
Error concealment guided robustness may include identifying a current portion of a current video stream. Identifying the current portion may include identifying a feature, or a vector of features, for the current portion. An estimated vulnerability metric may be identified based on the feature and an associated learned feature weight. An error correction code for the current portion may be generated based on the estimated vulnerability metric. Error concealment guided robustness may include generating learned feature weights based on one or more training videos by generating vulnerability metrics for the training videos and identifying relationships between features of the training videos and the vulnerability metrics generated for the training videos.
-
Citations
23 Claims
-
1. A method of generating error correction for a video stream, the method comprising:
-
identifying a current portion of a current video stream, the current portion having a feature; identifying an estimated vulnerability metric based on a learned feature weight associated with the feature, the estimated vulnerability metric being a value based on comparing; a first decoded portion of an encoded training portion of at least one training video stream, the encoded portion including the feature; and a second decoded portion of the encoded training portion of the at least one training video stream, the second decoded portion based on the encoded training portion with a simulated transmission error; and generating an error correction code for the current portion based on the estimated vulnerability metric. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 22)
-
-
10. An apparatus for generating error correction for a video stream, the apparatus comprising:
-
a memory; and a processor configured to execute instructions stored in the memory to; identify a current portion of a current video stream, the current portion having a feature; identify an estimated vulnerability metric based on a learned feature weight associated with the feature, the estimated vulnerability metric being a value based on comparing; a first decoded portion of an encoded training portion of at least one training video stream, the encoded portion including the feature; and a second decoded portion of the encoded training portion of the at least one training video stream, the second decoded portion based on the encoded portion with a simulated transmission error; and generate an error correction code for the current portion based on the estimated vulnerability metric. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 23)
-
-
18. A method for use in error correction, the method comprising:
- generating a learned feature weight by;
identifying a training portion of a training video stream, the training portion having a feature; generating an encoded training portion; generating a decoded control portion by decoding the encoded training portion; generating a decoded corrupted portion by; generating a transmission error portion by applying a simulated transmission error to the encoded training portion, and decoding the transmission error portion using at least one error concealment technique; determining a vulnerability metric based on the decoded control portion and the decoded corrupted portion; and determining the learned feature weight based on the feature and the vulnerability metric. - View Dependent Claims (19, 20, 21)
- generating a learned feature weight by;
Specification