Documente Academic
Documente Profesional
Documente Cultură
Abstract—A robust error concealment scheme using data hiding error control that adapts to the approaches both at the trans-
which aims at achieving high perceptual quality of images and mitter and at the receiver has proven to be more effective [2].
video at the end-user despite channel losses is proposed. The Error concealment methods use spatial and temporal informa-
scheme involves embedding a low-resolution version of each image
or video frame into itself using spread-spectrum watermarking,
tion to recognize that an error has occurred. Once an error is de-
extracting the embedded watermark from the received video tected, the received video stream is adjusted with an attempt to
frame, and using it as a reference for reconstruction of the parent recover the original data. A number of error concealment tech-
image or frame, thus detecting and concealing the transmission niques have been proposed in the literature that use either sta-
errors. Dithering techniques have been used to obtain a binary tistical methods to detect and correct errors (these are usually
watermark from the low-resolution version of the image/video computationally intensive) or depend on certain critical infor-
frame. Multiple copies of the dithered watermark are embedded
in frequencies in a specific range to make it more robust to channel mation from the transmitter, like the resynchronization markers,
errors. It is shown experimentally that, based on the frequency to detect these transmission errors.
selection and scaling factor variation, a high-quality watermark In this paper, a new robust error concealment algorithm which
can be extracted from a low-quality lossy received image/video uses watermarking is proposed. Watermarking is usually used
frame. Furthermore, the proposed technique is compared to its to introduce some redundancy to the transmitted data with little
two-part variant where the low-resolution version is encoded
increase in its bit rate during implementation [3].
and transmitted as side information instead of embedding it.
Simulation results show that the proposed concealment technique The basic idea of the proposed algorithm is as follows.
using data hiding outperforms existing approaches in improving A frame of a video is wavelet transformed and the low–low
the perceptual quality, especially in the case of higher loss proba- approximation coefficients (usually second- or third-order) are
bilities. then embedded in the frame itself during MPEG encoding. The
Index Terms—Data hiding, digital half-toning, error conceal- embedded data can then be error protected unequally such that
ment, image/video transmission, wireless video. the mark signal embedded packets are given higher protection
against channel errors. At the receiver, the mark is extracted
from the decoded frame. The channel corrupted information
I. INTRODUCTION of the frame is then reconstructed using the embedded mark
signal. Specific areas lost through transmission are selected
T HE transmission of images and video over wired and/or
wireless channels introduces multiple losses into the
transmitted data that manifest themselves as various types of
from the reconstructed mark signal and replaced in the original
frame, thus enhancing its perceptual quality.1 This contribution
artifacts. These artifacts degrade the quality of the received provides modified algorithms for implementation in video
image/video as they vary rapidly during the course of trans- transmission and high-detail color extensions in case of wired
mission based on the channel conditions. Therefore, there is a and wireless transmission scenarios. Also, a comparison of
need for a good error concealment technique that can detect the proposed technique to its two-part variant (where the
and correct (or conceal) these errors better and display a good low-resolution child image is encoded and transmitted as side
quality image/video regardless of the channel conditions [1]. In information) is provided along with an extensive analysis of its
the case of video transmission over wireless channels, adaptive performance.
The paper is organized as follows. Section II briefly points
Manuscript received September 3, 2003; revised March 6, 2004. This work
out the previous work in error concealment where similar/re-
was supported in part by the National Science Foundation under Grant CCR- lated approaches have been addressed. Section III describes
0105404, the University of California under a MICRO grant, Philips Research the proposed error concealment/reconstruction algorithm using
Laboratories, and Microsoft Corporation. This paper was recommended by As- data hiding. Section IV gives a detailed explanation of the
sociate Editor L. Onural.
C. B. Adsumilli, M. C. Q. Farias, and S. K. Mitra are with the Depart- multiple scenarios under which the algorithm can be modified
ment of Electrical and Computer Engineering, University of California, to make it more efficient. The simulations done using the
Santa Barbara, CA 93106–9560 USA (e-mail: chowdary@ece.ucsb.edu; proposed technique and the obtained results are presented in
mylene@ece.ucsb.edu; mitra@ece.ucsb.edu).
M. Carli is with the Department of Applied Electronics, University of Rome
Tre, Rome 00146, Italy (e-mail: carli@uniroma3.it). 1Preliminary results of the performance of the algorithm’s implementation
Digital Object Identifier 10.1109/TCSVT.2005.856933 for wired transmission of images have been partially reported [4].
Section V. In Section VI, conclusions are drawn based on the errors in the data will have smaller and local effects on the re-
results, and suggestions for further work are discussed. constructed video. A possible solution to the third problem will
be addressed in a future work.
A set of concealment techniques that do not use data hiding
II. PREVIOUS WORK while giving similar high levels of performance have been pro-
The use of data hiding as an error control tool was first intro- posed in the literature. Block-based deterministic interpolation
duced by Liu and Li [5]. They extracted the important informa- models are used for reconstruction of missing blocks in either
tion in an image, like the dc components of each 8 8 block, spatial domain [14]–[16] (simplified edge-extraction imposition
and embedded it into the host image. In the work that followed, for obtaining the directional interpolation was considered in
Liu and Li’s work formed the basis. Certain key features were [14] and [15] while projection onto convex sets was considered
extracted from the image, and these features were encoded and in [16]) or spectral domain [17] (where lost DCT coefficients
data hidden in the original image either as a resilience tool or are estimated based on spatial smoothing constraints). Li and
for concealment [6]–[8]. Orchard provided a good review of these techniques and pro-
Watermarking of error correcting codes was introduced by posed a set of block-based sequential recovery techniques [18].
Lee and Won [9]. Here, the parities generated by conventional These work well in simplified loss scenarios where successfully
error control codes were used for watermarking sequence. A received data are assumed to be reconstructed loss-free. This is
region of interest (ROI)-based coded bit stream embedding was often not the case. A comparison of these techniques with the
employed by Wang and Ji, where the ROI DCT bit stream is proposed technique is provided in Section V.
embedded into the region-of-background wavelet coefficients
[10]. This technique gives better results when perception-based III. ERROR CONCEALMENT USING DATA HIDING
encoding is employed. The proposed scheme can be divided into an embedding
The concept was extended to video coding by Bartolini et al. part and a retrieval part. It should be noted that the proposed
[11]. However, they used data hiding as a tool to increase the technique does not overload the communication channel by
syntax-based error detection rate in H.263 but not for recovering requiring feedback or any retransmission of damaged blocks.
or correcting lost data. Munadi et al. extended the concept of key
feature extraction and embedding to interframe coding [12]. In A. Embedding Part
their scheme, the most important feature is embedded into the
The data hiding technique used here is a modified version
prediction error of the current frame. However, the effects on
of the Cox’s watermarking algorithm [19]. Due to the limited
motion vectors and the loss of motion-compensated errors were
embedding capacity of the algorithm, it is practically not fea-
not addressed. Yilmaz and Alatan proposed embedding a combi-
sible to embed the whole frame into itself [20]. In this work,
nation of edge oriented information, block bit-length, and parity
therefore, the discrete wavelet transform (DWT) and dithering
bits in intraframes [13]. They use a minimally robust technique
techniques have been used to reduce the amount of data to be
of even–odd signaling of DCT coefficients for embedding.
embedded such that the algorithm embeds maximum informa-
The problems with existing techniques are as follows.
tion while still catering to the feasibility issues. Wavelets have
1) Only one or a few selected set of key features are used for several properties that make them good candidates for this ap-
embedding. These features may not necessarily follow the plication. Some of the important ones relevant to this algorithm
loss characteristics of the channel employed. are: 1) the approximation coefficients provide a good low-reso-
2) They use transform domain to encode the data that needs lution estimate of the image, while minimizing the aliasing ar-
to be embedded, often DCT. However, if losses occur on tifacts resulting from the reduction in resolution, and 2) The
the dc coefficient or a set of first few ac coefficients, the wavelet coefficients are localized, such that a corruption of a
loss to the extracted reference would be significant and coefficient through channel errors has only a local effect on the
therefore may lead to reduction in concealment perfor- image. Dithering techniques make it possible to generate bi-
mance. nary images which look very similar to gray-level images. The
3) Almost all of the techniques use fragile or semifragile technique employed here is the Floyd–Steinberg error diffusion
data-embedding schemes which are more susceptible to dithering algorithm [21], [22]. The DWT approximation coeffi-
attacks. cients are half-toned before being embedded.
Our proposed technique avoids two of the three problems by The block diagram of the embedding algorithm is shown in
embedding half-toned version of the whole reference image (in- Fig. 1. The operation of the embedding part can be described
stead of encoding its transform coefficients). This way, loss or as follows. The two-dimensional (2-D) DWT of the frame is
1396 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 11, NOVEMBER 2005
first computed. A second-level DWT is performed again on the application. For the purpose of delivering a high-quality video
approximation coefficients to obtain an image that is 1/16th the through a channel, the mid-frequencies are a good choice. In-
size of the original frame. A half-toned image, the marker, is serting the watermark in the low frequencies would cause vis-
then generated from the reduced size image. One marker is used ible artifacts in the image, while inserting it in the high frequen-
for each frame. After the marker is generated, each pixel of the cies would make it more prone to channel-induced defects. Also,
marker is repeated four times in a 2 2 matrix format. This multiple copies of the marker can be inserted sequentially with
repetition operation allows the decoder to recover the marker various initial frequencies to make the watermark more robust
from the data in a more robust fashion. to channel errors. In this case, the multiple copies are generated
Mathematically, the reduced size image generated for the th using independent randomly generated pseudonoise matrices.
frame can be represented as . Here, is of size and
is of size . The half-toning operation is performed B. Retrieval Part
on using a Floyd–Steinberg diffusion kernel given by The block diagram of the retrieval technique is shown in
Fig. 2. The DCT coefficients of the luminance channel of the
(1) received frame , denoted by , are computed as
(4)
where is the current pixel position and is typically ap- where represents the 2-D DCT operation.
plied on each 3 3 block of the reduced size image. The re- These coefficients are then multiplied by the corresponding
sulting marker is denoted as . Each pixel of is then re- pseudo-noise image . The pseudonoise image generated is the
peated in a 2 2 matrix format to form . Note that is of same as that at the transmitter side. It is tacitly assumed that the
size . receiver knows the seed for generating the pseudonoise image
A zero-mean, unit variance pseudonoise image is then ran- and the initial frequencies , where the mark was in-
domly generated with a Gaussian distribution and a known seed. serted. An issue of concern with this assumption is that it might
A unique pseudonoise image of size is generated lead to possible synchronization problems when severe channel
for each frame of the video. For a generic th frame of a video errors cause loss of frames. This can in turn be handled by
sequence, the final watermark is obtained by multiplying embedding the frame order number (similar to the sequence
with the pseudonoise image number in packet transmission) into the frame itself. The re-
(2) ceiver-side pseudonoise generator algorithm can be driven by
the recovered value while the missing frames can be detected
where represents element-by-element multiplication. Note using the missing frame order numbers.
that . The result of the multiplication, denoted as , is averaged
The computed DCT coefficients of the luminance channel of over the four pixels (2 2 matrix form) and the binary marker
the frame are denoted as . The watermark is then scaled is extracted by taking the sign of this average
by a factor and added to a set of coefficients in starting at
the initial frequencies of . The resulting image is (5)
given by
where
(3)
where and correspond to the pixel location in the spatial (6)
domain and the coefficient location in the DCT domain. Here,
, , and represent the individual component and , , and are the individual component
values of matrices , , and , respectively. Note that values of matrices and and the extracted marker ,
and . is then inverse transformed, respectively. Note here that the values of greater than 0 are
encoded, and transmitted. assigned a value of 1 and those that are equal to or less than 0
In the proposed method, the final watermark is added only to are assigned a value 0 to make the resulting image binary. Also
the mid-frequency DCT coefficients. The range of frequencies note that, while the size of is , the size of is
where the watermark is inserted is strongly dependent on the .
ADSUMILLI et al.: ROBUST ERROR CONCEALMENT TECHNIQUE USING DATA HIDING FOR IMAGE AND VIDEO TRANSMISSION 1397
state, respectively, with predefined probabilities and . This Fig. 6. Block diagram of the generalized error-diffusion algorithm. is the
A
h
means that the Markov chain is in the good state if the packet is hysteresis value and is a low-pass filter.
received in time without any errors and is in the bad state if the
packet is lost during transmission due to latency or bandwidth in Fig. 6 is then applied to the CMYK images individually to
limitations of the channel. obtain a color half-toned image.
The parameters and are called the transition probabilities The block diagram of the generalized error diffusion algo-
of the Markov chain between the good and the bad states. The rithm used for color image half-toning, shown in Fig. 6, is quite
transition matrix of this two-state Markov chain can be repre- similar to Floyd–Steinberg dithering technique in Fig. 5 except
sented as that it has another positive feedback loop [28]. The sample ,
created from threshold operation on , goes through a scaled
(9) low-pass filter with a predefined hysteresis value . Since the
sample values after threshold process are sharper in the CMYK
The values of and are quite apart with more emphasis space, this low-pass filtering operation is required. is chosen
on the good state. For a typical wireless channel, the values of to be a 3 3 low-pass filter to simplify implementation with
and would be around 0.999 and 0.001. Note here that respect to the 3 3 Floyd–Steinberg kernel . is chosen
. Such a model is followed here for the wireless channel to be 0.5 in our implementation.
simulations, and the results are presented in Section V. After the error-diffusion process, the image is converted back
to RGB color space by an approximate inverse of the transfor-
B. Gray Scale Versus Color mation defined in (10). The conversion can be represented as
The algorithm can be extended to work in the case of color
image/video transmission. In this case, differences can be seen (11)
not only in the algorithm implementation, but in the results as
well. The variation in results and their analysis are presented in Either the R, G, and B channels or the Y, Cb, and Cr channels of
Section V while the implementation changes are discussed here. the half-toned color marker signal can now be embedded into
The half-toning technique used for gray-scale image pro- the luminance component of the original image/video frame.
cessing is a simple feedback-based loop as shown in Fig. 5. Each of these cases with individual and dependent variations
Here, is the Floyd–Steinberg kernel given in (1) and in are considered, and the results are presented and analyzed
is a threshold operation. and , the errors in the in Section V.
th sample of and , respectively, are “diffused” back
into to samples using a feedback loop. This C. Image Versus Video
implementation gives a pretty good estimate of the original There are several methods in which the previous algorithm
gray-scale image as a binary image. can be extended to video. Due to the facts that the algorithm
For the case of color images/videos, we use color dithering can be implemented on a frame-by-frame basis and the effects
[27]. Here, the color space is divided into four subspaces cyan of watermarking on motion vectors is minimal (shown later),
(C), magenta (M), yellow (Y), and black (K). The original RGB this algorithm can be employed in almost all of the currently ex-
color image is converted into a CMYK image using a isting video communication codecs like MPEG or H.263.2 How-
transformation given by ever, implementing the algorithm on a frame-by-frame basis is
practically not viable [even though it gives very high peak SNR
(PSNR) values after reconstruction] because it increases the pre-
and post-processing complexity of the video transceivers.
(10) A tradeoff issue that needs to be considered is a reduction in
the pre- and post-processing complexity against the loss of some
where and . The black values efficiency of the error concealment that the algorithm provides.
are initially calculated using old , , and values, and 2Implementation in H.263 is much more straightforward based on the fact
then the new , , and values are obtained by modifying that the algorithm can be extended to work for YUV (4:2:2) and (4:2:0) color
the old ones using these values. The error diffusion shown video frames.
ADSUMILLI et al.: ROBUST ERROR CONCEALMENT TECHNIQUE USING DATA HIDING FOR IMAGE AND VIDEO TRANSMISSION 1399
Fig. 7. (a) Original k th frame of table tennis sequence. (b) Original (k + 1)th frame. (c) Motion vectors between the above frames. (d) Motion vectors when the
watermark is embedded in only the k th frame. (e) Motion vectors when the watermark is embedded in both the frames. (f) Difference in motion vectors for (c)
and (e).
We can achieve this tradeoff in two ways. In the first method, we motion vector information of the P- and the B-frames, provided
exploit the motion vector information of the video [29]. It can that the P-frames are embedded in themselves.
be seen from Fig. 7 that the effect of embedding the watermark The effects of the algorithm on motion vectors can be seen in
in consecutive frames does not cause noticeable differences to Fig. 7. The original th and th frames of the Table tennis
the motion vectors. Previous work also suggests that any small video are shown in Fig. 7(a) and (b), respectively. Fig. 7(c)
effects that this process creates can be used to enhance the error shows the original motion vectors between these two frames,
concealment at the receiver by coding and transmitting these and Fig. 7(d) shows the effect of watermarking on the motion
differences [30]. Hence, we can embed the low-resolution ver- vectors when the watermark is embedded only in the th frame.
sions of the I-frames inside themselves with little change in the Note that these effects are seen in the areas (mid-frequency
1400 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 11, NOVEMBER 2005
Fig. 8. (a) Original frame. (b) Received frame with mean loss probability =
0 15 = 2 5%
: , variance : ; PSNR = 19 8271
: . (c) Error-concealed frame; =
36 = 27 6852
: ; PSNR : . (d) Localized scaling error-concealed frame; PSNR =
28 9047
: .
Fig. 10. Comparison of the quality of the received frame versus the Fig. 12. Variation of the quality of the extracted watermark with increasing
error-concealed (EC) and the localized error-concealed frames with variation packet loss probabilities for the same sample set as in Fig. 10.
in loss probability for a sample set of 25 simulations.
Fig. 13. Mean and standard deviation of the extracted watermark quality in
Fig. 12.
Fig. 11. Mean and standard deviation of the curves in Fig. 10.
Fig. 15. Result of watermark quality variation with for a sample packet loss Fig. 16. Comparison of extracted watermark quality with degrading frame
probability of 0.09. The plot also shows the convergence of watermark quality quality after watermark insertion.
for higher values of .
Fig. 18. (a) Original watermark color image. (b) Received watermark for
a mean loss probability of 0.15 and variance 3% when RGB channels are
embedded with = 5. (c) Extracted watermark for the same loss when YCrCb
channels (4:2:0) are embedded with = 5. (d) Extracted watermark when
YCrCb (4:2:0) channels are embedded with = 3:75, = 4:5, and
= 5. Note that (b)–(d) are inverse half-toned images.
TABLE II
PERFORMANCE COMPARISON IN PSNR (dB)
ACKNOWLEDGMENT
The authors would like to thank the reviewers for their valu-
able and insightful suggestions at various stages of the paper
revisions.
REFERENCES
[1] Y. Wang and Q.-F. Zhu, “Error control and concealment for video com-
munications,” Proc. IEEE, vol. 86, no. 5, pp. 974–997, May 1998.
[2] S. B. Wicker, Error Control Systems of Digital Communication and
Storage. Englewood Cliffs, NJ: Prentice-Hall, 1995.
[3] T. Kalkar, “Considerations on watermarking security,” in Proc. IEEE
Workshop Multimedia Signal Processing, Cannes, France, Oct. 2001,
pp. 201–206.
[4] C. B. Adsumilli, M. C. Q. Farias, M. Carli, and S. K. Mitra, “A hy-
brid constrained unequal error protection and data hiding scheme for
packet video transmission,” in Proc. IEEE Int. Conf. Acoustics, Speech
and Signal Processing, vol. 5, Hong Kong, Apr. 2003, pp. 680–683.
[5] Y. Liu and Y. Li, “Error concealment for digital images using data
Fig. 19. PSNR-versus-loss-rate curves for the techniques of ECDH and ECSI
hiding,” presented at the 9th DSP Workshop, Hunt, TX, Oct. 2000.
for the Sail image. (a) PSNR of the reconstructed image. (b) PSNR of the
[6] Y. Shao, L. Zhang, G. Wu, and X. Lin, “Reconstruction of missing blocks
retrieved low-resolution images.
in image transmission by using self-embedding,” in Proc. Int. Symp. In-
telligent Multimedia, Video and Speech Processing, Hong Kong, May
2001, pp. 535–538.
scenario. Fig. 19(a) gives the PSNR-versus-loss-rate curves of [7] P. Yin, B. Liu, and H. H. Yu, “Error concealment using data hiding,” in
the two techniques. It can be seen that ECDH performs better at Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 3,
higher loss rates (up to 3–4-dB improvement), while the perfor- May 2001, pp. 1453–1456.
[8] C.-S. Lu, “Wireless multimedia error resilience via a data hiding tech-
mance of both the techniques is comparable at lower loss rates nique,” in Proc. Int. Workshop Multimedia Signal Processing, Virgin Is-
(up to about 0.2). Note that, at very low packet loss probabili- lands, Dec. 2002, pp. 316–319.
ties ( 0.04), ECSI tends to give a better performance. This may [9] J. Lee and C. S. Won, “A watermarking sequence using parities of error
control coding for image authentification and correction,” IEEE Trans.
be due to the fact that the end result of the ECDH suffers from Consum. Electron., vol. 46, no. 2, pp. 313–317, May 2000.
minor data hiding defects, which are rarely visible. Fig. 19(b) [10] J. Wang and L. Ji, “A region and data hiding based error concealment
shows the variation in the PSNR values of the received low-res- scheme for images,” IEEE Trans. Consum. Electron., vol. 47, no. 2, pp.
257–262, May 2001.
olution reference images. [11] F. Bartolini, A. Manetti, A. Piva, and M. Barni, “A data hiding approach
for correcting errors in H.263 video transmitted over a noisy channel,”
in Proc. IEEE Workshop Multimedia Signal Processing, Oct. 2001, pp.
VI. CONCLUDING REMARKS 65–70.
The data-hiding technique employed for error concealment [12] K. Munadi, M. Kurosaki, and H. Kiya, “Error concealment using digital
watermarking technique for interframe video coding,” in Proc. Int. Tech.
is efficient in protecting the low–low wavelet coefficients of Conf. Circuits/Systems, Computers, and Communications, Jul. 2002, pp.
the frame from transmission errors by embedding multiple 599–602.
1406 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 11, NOVEMBER 2005
[13] A. Yilmaz and A. A. Alatan, “Error concealment of video sequences by Mylène C. Q. Farias (M’02) received the B.Sc.
data hiding,” in Proc. Int. Conf. Image Processing, vol. 3, Sept. 2003, degree in electrical engineering from Universidade
pp. 679–682. Federal de Pernambuco (UFPE), Pernambuco,
[14] P. Salama, N. B. Shroff, E. J. Coyle, and E. J. Delp, “Error concealment Brazil, in 1995, the M.Sc. degree in electrical
techniques for encoded video streams,” in Proc. Int. Conf. Image Pro- engineering from the Universidade Estadual de
cessing, vol. 1, Oct. 1995, pp. 9–12. Campinas (UNICAMP), Sao Paulo, Brazil, in 1998,
[15] J. W. Park and S. U. Lee, “Recovery of corrupted image data based on and the Ph.D. degree in electrical and computer
the NURBS interpolation,” IEEE Trans. Circuits Syst. Video Technol., engineering from the University of California, Santa
vol. 9, no. 10, pp. 1003–1008, Oct. 1999. Barbara (UCSB), in 2004.
[16] H. Sun and W. Kwok, “Concealment of damaged block transform coded She is currently a Post-Doctoral Researcher with
images using projection onto convex sets,” IEEE Trans. Image Process., the Departments of Electrical and Computer Engi-
vol. 4, no. 4, pp. 470–477, Apr. 1995. neering and Psychology, UCSB, under the supervision of Prof. S. K. Mitra and
[17] Y. Wang and Q. Zhu, “Signal loss recovery in DCT-based image and Prof. J. M. Foley, respectively. Her current interests include video quality assess-
video codecs,” in Proc. SPIE Conf. Visual Communications and Image ment, video processing, multimedia, watermarking, and information theory.
Processing, vol. 1605, Nov. 1991, pp. 667–678.
[18] X. Li and M. T. Orchard, “Novel sequential error-concealment tech-
niques using orientation adaptive interpolation,” IEEE Trans. Circuits
Syst. Video Technol., vol. 12, no. 10, pp. 857–864, Oct. 2002.
[19] I. Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure spread spectrum
watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no.
12, pp. 1673–1687, Dec. 1997. Sanjit K. Mitra (S’59–M’63–SM’69–F’74–LF’01)
[20] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data- received the B.Sc. (Hons.) degree in physics from the
embedding and watermarking technologies,” Proc. IEEE, vol. 86, no. 6, Utkal University, Cuttack, India, in 1953, the M.Sc.
pp. 1064–1087, Jun. 1998. (Tech.) degree in radio physics and electronics from
[21] J. Buchanan and L. Streit, “Threshold-diffuse hybrid halftoning Calcutta University, Calcutta, India, in 1956, and the
methods,” in Proc. Western Computer Graphics Symp. (SKIGRAPH), M.S. and Ph.D. degrees in electrical engineering from
1997, pp. 79–90. the University of California, Berkeley, in 1960 and
[22] R. W. Floyd and L. Steinberg, “An adaptive algorithm for spatial gray- 1962, respectively.
scale,” Proc. Soc. Information Display, vol. 17, no. 2, pp. 75–78, Apr. He has been a Professor of electrical and computer
1976. engineering with the University of California, Santa
[23] Z. Xiong, M. T. Orchard, and K. Ramachandran, “Inverse halftoning Barbara, since 1977, where he served as Chairman of
using wavelets,” IEEE Trans. Image Process., vol. 8, no. 10, pp. the Department from July 1979 to June 1982. He has published over 600 papers
1479–1483, Oct. 1999. in signal and image processing and 12 books and holds five patents.
[24] M. Mese and P. P. Vaidyanathan, “Look up table (LUT) inverse Dr. Mitra is a Fellow of the AAAS and SPIE and a member of EURASIP. He
halftoning,” IEEE Trans. Image Process., vol. 10, no. 10, pp. 1566–1578, has served the IEEE in various capacities including service as the President of
Oct. 2001. the IEEE Circuits and Systems Society in 1986 and as a Member-at-Large of the
[25] M.-Y. Shen and C.-C. Kuo, “A robust nonlinear filtering approach to Board of Governors of the IEEE Signal Processing Society from 1996 to 1999.
inverse halftoning,” J. Vis. Commun. Image Representat., vol. 12, pp. He is a member of the U.S. National Academy of Engineering, an Academician
84–95, Mar. 2001. of the Academy of Finland, a member of the Norwegian Academy of Techno-
[26] J. J. Lemmon, “Wireless Link Statistical Bit Error Model,” Dept. logical Sciences, a foreign member of the Croatian Academy of Sciences and
Commerce (Communication and Information), National Telecommu- Arts, and a foreign member of the Academy of Engineering of Mexico. He was
nications and Information Administration (NTIA), Tech. Rep. 02-394, the recipient of the 1973 F. E. Terman Award and the 1985 AT&T Foundation
2002. Award of the American Society of Engineering Education, the 1989 Education
[27] D. L. Lau and G. R. Arce, Modern Digital Halftoning. New York: Award, and the 2000 Mac Van Valkenburg Society Award of the IEEE Circuits &
Marcel Dekker, 2001. Systems Society, the 1996 Technical Achievement Award and the 2001 Society
[28] H. R. Kang, Color Technology for Electronic Imaging De- Award of the IEEE Signal Processing Society, the IEEE Millennium Medal in
vice. Bellingham, WA: SPIE Opt. Eng. Press, 1997. 2000, the McGraw-Hill/Jacob Millman Award of the IEEE Education Society
[29] F. Dufaux and F. Moscheni, “Motion estimation techniques for digital in 2001, and the 2002 Technical Achievement Award of the European Associ-
TV: a review and a new contribution,” Proc. IEEE, vol. 83, no. 6, pp. ation for Signal Processing (EURASIP). He was the co-recipient of the 2000
858–876, Jun. 1995. Blumlein–Browne–Willans Premium of the the Institution of Electrical Engi-
[30] A. M. Tekalp, Digital Video Processing. Englewood Cliffs, NJ: Pren- neers (London) and the 2001 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS
tice-Hall, 1995. FOR VIDEO TECHNOLOGY Best Paper Award. He has been awarded honorary
[31] K. A. Peker, A. A. Alatan, and A. N. Akansu, “Low-level motion activity doctorate degrees from the Tampere University of Technology, Tampere, Fin-
features for semantic characterization of video,” in Proc. IEEE Int. Conf. land, and the “Politehnica” University of Bucharest, Bucharest, Romania.
Multimedia and Expo., New York, Aug. 2000, pp. 801–804.
[32] (1995) The Network Simulator. [Online]http://www.isi.edu/nsnam/ns/
[33] S. Dennet, The Cdma2000 ITU-R RTT Candidate Submission (0.18),
1998.
[34] M. Wu, “Multimedia data hiding,” Ph.D. dissertation, Dept. Elect. Eng.,
Princeton Univ., Princeton, NJ, Jun. 2001.
Marco Carli (SM’05) received the Laurea degree in
telecommunication engineering from the University
Chowdary B. Adsumilli (S’95) received the of Roma, “La Sapienza,” Rome, Italy, in 1996.
B.Tech. degree in electronics and communications He was with Datamat-Systems Engineering Com-
engineering from Jawaharlal Nehru Technological pany until 1997. He is now an Associate Researcher
University, Hyderabad, India, in 1999 and the M.S. with the University of Rome, “Roma Tre,” Rome,
degree in electrical and computer engineering from where he has been also a Lecturer for the graduate
the University of Wisconsin, Madison, in 2001. He course telecommunication systems and multimedia
is currently working toward the Ph.D. degree at communications. Since August 2000, he has been
the Image Processing Laboratory in Electrical and a Visiting Research Associate with the Image Pro-
Computer Engineering, University of California, cessing Laboratory, University of California, Santa
Santa Barbara. Barbara. His research interests are in the area of digital signal and image
His research interests include image and video pro- processing and in multimedia communications.
cessing, multimedia communications, error resilience and concealment, water- Dr. Carli is a member of the Technical Committees of several IEEE confer-
marking, video quality assessment, and wireless video. ences and a reviewer for several IEEE journals.