Joint Source-Channel Decoding -  Pierre Duhamel,  Michel Kieffer

Joint Source-Channel Decoding (eBook)

A Cross-Layer Perspective with Applications in Video Broadcasting
eBook Download: PDF | EPUB
2009 | 1. Auflage
334 Seiten
Elsevier Science (Verlag)
978-0-08-092244-7 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
110,00 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
  • Treats joint source and channel decoding in an integrated way
  • Gives a clear description of the problems in the field together with the mathematical tools for their solution
  • Contains many detailed examples useful for practical applications of the theory to video broadcasting over mobile and wireless networks

Traditionally, cross-layer and joint source-channel coding were seen as incompatible with classically structured networks but recent advances in theory changed this situation. Joint source-channel decoding is now seen as a viable alternative to separate decoding of source and channel codes, if the protocol layers are taken into account. A joint source/protocol/channel approach is thus addressed in this book: all levels of the protocol stack are considered, showing how the information in each layer influences the others.

This book provides the tools to show how cross-layer and joint source-channel coding and decoding are now compatible with present-day mobile and wireless networks, with a particular application to the key area of video transmission to mobiles. Typical applications are broadcasting, or point-to-point delivery of multimedia contents, which are very timely in the context of the current development of mobile services such as audio (MPEG4 AAC) or video (H263, H264) transmission using recent wireless transmission standards (DVH-H, DVB-SH, WiMAX, LTE).

This cross-disciplinary book is ideal for graduate students, researchers, and more generally professionals working either in signal processing for communications or in networking applications, interested in reliable multimedia transmission. This book is also of interest to people involved in cross-layer optimization of mobile networks. Its content may provide them with other points of view on their optimization problem, enlarging the set of tools which they could use.

Pierre Duhamel is director of research at CNRS/ LSS and has previously held research positions at Thomson-CSF, CNET, and ENST, where he was head of the Signal and Image Processing Department. He has served as chairman of the DSP committee and associate Editor of the IEEE Transactions on Signal Processing and Signal Processing Letters, as well as acting as a co-chair at MMSP and ICASSP conferences. He was awarded the Grand Prix France Telecom by the French Science Academy in 2000. He is co-author of more than 80 papers in international journals, 250 conference proceedings, and 28 patents.

Michel Kieffer is an assistant professor in signal processing for communications at the Universit? Paris-Sud and a researcher at the Laboratoire des Signaux et Syst?mes, Gif-sur-Yvette, France. His research interests are in joint source-channel coding and decoding techniques for the reliable transmission of multimedia contents. He serves as associate editor of Signal Processing (Elsevier). He is co-author of more than 90 contributions to journals, conference proceedings, and book chapters.



  • Treats joint source and channel decoding in an integrated way
  • Gives a clear description of the problems in the field together with the mathematical tools for their solution
  • Contains many detailed examples useful for practical applications of the theory to video broadcasting over mobile and wireless networks

Treats joint source and channel decoding in an integrated way Gives a clear description of the problems in the field together with the mathematical tools for their solution Contains many detailed examples useful for practical applications of the theory to video broadcasting over mobile and wireless networks Traditionally, cross-layer and joint source-channel coding were seen as incompatible with classically structured networks but recent advances in theory changed this situation. Joint source-channel decoding is now seen as a viable alternative to separate decoding of source and channel codes, if the protocol layers are taken into account. A joint source/protocol/channel approach is thus addressed in this book: all levels of the protocol stack are considered, showing how the information in each layer influences the others. This book provides the tools to show how cross-layer and joint source-channel coding and decoding are now compatible with present-day mobile and wireless networks, with a particular application to the key area of video transmission to mobiles. Typical applications are broadcasting, or point-to-point delivery of multimedia contents, which are very timely in the context of the current development of mobile services such as audio (MPEG4 AAC) or video (H263, H264) transmission using recent wireless transmission standards (DVH-H, DVB-SH, WiMAX, LTE). This cross-disciplinary book is ideal for graduate students, researchers, and more generally professionals working either in signal processing for communications or in networking applications, interested in reliable multimedia transmission. This book is also of interest to people involved in cross-layer optimization of mobile networks. Its content may provide them with other points of view on their optimization problem, enlarging the set of tools which they could use. Pierre Duhamel is director of research at CNRS/ LSS and has previously held research positions at Thomson-CSF, CNET, and ENST, where he was head of the Signal and Image Processing Department. He has served as chairman of the DSP committee and associate Editor of the IEEE Transactions on Signal Processing and Signal Processing Letters, as well as acting as a co-chair at MMSP and ICASSP conferences. He was awarded the Grand Prix France Telecom by the French Science Academy in 2000. He is co-author of more than 80 papers in international journals, 250 conference proceedings, and 28 patents. Michel Kieffer is an assistant professor in signal processing for communications at the Universite Paris-Sud and a researcher at the Laboratoire des Signaux et Systemes, Gif-sur-Yvette, France. His research interests are in joint source-channel coding and decoding techniques for the reliable transmission of multimedia contents. He serves as associate editor of Signal Processing (Elsevier). He is co-author of more than 90 contributions to journals, conference proceedings, and book chapters. Treats joint source and channel decoding in an integrated way Gives a clear description of the problems in the field together with the mathematical tools for their solution Contains many detailed examples useful for practical applications of the theory to video broadcasting over mobile and wireless networks

Front Cover 1
Title Page 4
Copyright Page 5
Table of Contents 6
Preface and Acknowledgements 8
Chapter 1. Introduction: Context 10
1.1 Multimedia Wireless: The Need for New Tools 12
1.2 Example Applications 14
1.3 Joint Source-Channel Coding and Decoding 18
1.4 Outline 21
Chapter 2. Why Joint Source and Channel Decoding? 22
2.1 Information Theoretic Preliminaries 23
2.2 To Separate or Not To Separate? 28
2.3 To Code or Not To Code? 33
2.4 Back to the Separation Paradigm 34
2.5 Conclusion 39
Chapter 3. Source-Coding Primer 40
3.1 Components of Source Coders 41
3.2 Entropy Coding 45
3.3 Quantization 65
3.4 Differential Coding 72
3.5 Transform Coding 79
3.6 Wavelet-Based Coding 87
3.7 Packetization of Compressed Data 91
3.8 Conclusion 92
Chapter 4. Identifying Residual Redundancy 94
4.1 Stochastic Redundancy 95
4.2 Deterministic Redundancy 102
4.3 Comparing Various Sources of Redundancy 118
4.4 Conclusion 127
Chapter 5. Exploiting the Residual Redundancy 128
5.1 Estimators 130
5.2 Element-by-Element MAP Estimation Algorithms 132
5.3 Sequence Estimation Algorithms 147
5.4 Example: Decoding MPEG-4 AAC Scale Factors 153
5.5 Possible Extensions 158
Chapter 6. Toward Practical Implementations 160
6.1 State Aggregation 161
6.2 Projected Trellises 169
6.3 Grouping Code words 175
6.4 Sequential Decoders 184
6.5 Conclusion 199
Chapter 7. Protocol Layers 200
7.1 General Architecture 201
7.2 Identifying the Redundancy 215
7.3 General Properties 223
7.4 Conclusion 224
Chapter 8. Joint Protocol-Channel Decoding 226
8.1 Permeable Layer Mechanism 227
8.2 MAP Estimator for Robust Header Recovery 229
8.3 Robust Burst Segmentation 241
8.4 Computing APPs of Inputs of Block Codes 250
8.5 Discussion 254
Chapter 9. Joint Cross-Layer Decoding 256
9.1 Network and PHY Layers May Jointly Help the Application Layer 257
9.2 Iterative Decoding 269
9.3 Discussion 279
Chapter 10. Introduction to Joint Source-Channel Coding 280
10.1 Traditional View of JSCC 282
10.2 Design of Robust Entropy Codes 292
10.3 Overcomplete Representations 298
10.4 Conclusion 303
Chapter 11. Open Challenges 306
11.1 Joint Source-Channel Decoding 306
11.2 Joint Source-Channel Coding 307
11.3 Joint Source-Channel Coding/Decoding 309
Appendix A. Format of 802.11 Packets 312
A.1 PHY Packets Format 312
A.2 Format of the MAC Packets Associated to the DCF Protocol 313
A.3 Format Of IP Packets 316
A.4 The Transport Layer (UDP/RTP) 317
Bibliography 320
Index 332

Chapter 2

Why Joint Source and Channel Decoding?


Publisher Summary


This chapter introduces theoretical justifications for joint source-channel coding (JSCC) and identifies certain expectations that one may have regarding JSCC and joint source-channel decoding (JSCD). It provides the basic information theoretic tools that are needed to understand the Shannon bounds in their various incarnations. One can evaluate, for simple sources, the minimum rate that is required to communicate the given source over a particular channel with a specified maximum end-to-end distortion. It demonstrates the separation theorem to be strongly dependent on the assumption of point-to-point communication of stationary sources without constraints on encoder/decoder complexity. Furthermore, it argues that practical applications (with complexity constraints, one-to-many architectures, and nonstationary sources and channels) can be better served by joint source/channel decoders. It then explains that JSCD, compared to separate channel decoding and source decoding, is better able to exploit imperfections (i.e., redundancy) in the received bitstream, especially when side information introduced by network protocols are considered.

This chapter introduces theoretical justifications for joint source-channel coding (JSCC) and identifies certain expectations that one may have regarding JSCC and joint source-channel decoding (JSCD). While we mainly focus on a justification for JSCC, we also discuss JSCD toward the end of the chapter.

While JSCC was, initially, of interest to only a small group of researchers, it has, more recently, gained widespread attention. For some of the readers just learning about this field, the main concept may seem somewhat awkward: Is it really possible to forget Shannon’s separation theorem? For other readers, Shannon’s work may be remembered only vaguely. For these reasons, we start with a brief review of Shannon theory, we carefully explain the origin of the separation theorem, we outline limitations on source coding and on channel coding, and we define an important quantity – the optimum performance theoretically attainable (OPTA) – for the communication of a particular source over a particular channel. From these foundations, the assumptions under which the separation theorem holds become clear, and the expectations that one has when working on JSCC can be made more explicit.

These expectations are illustrated in two ways: In a first step, we describe some simple scenarios where, even though the separation theorem holds, separation is not the only approach to optimal system design. In a second step, we summarize key ways in which practical situations differ from the abstract model that was used to justify the separation theorem. We concentrate on the broadcast scenario, which, given modern applications, is more prevalent than the point-to-point scenario, and which, by its nature, results in imperfectly known channel parameters. In this case, it is shown that the separation theorem does not hold.

Our presentation closely follows the studies of Zahir Azami et al. (1996) and Gatspar et al. (2003).

2.1 INFORMATION THEORETIC PRELIMINARIES


This section provides the basic information theoretic tools that are needed to understand the Shannon bounds in their various incarnations. While, with channel coding, it is quite common to check the performance of a proposed system against the best attainable performance, it is not as common in source coding, even when one knows the rate-distortion curves. One of the reasons for this is that the corresponding computations are likely to be intractable, as a result of the high correlation found in practical source signals like video. In addition, it is less well known that a similar bound exists for JSCC, which is the real target of this book. In fact, one can evaluate, for simple sources, the minimum rate that is required to communicate the given source over a particular channel with a specified maximum end-to-end distortion. This point is clarified later in this section.

2.1.1 The Situation of Interest


When deriving bounds, one typically requires a simple model for the situation of interest. We use here the classical transmission model, as depicted in Figure 2.1. We now carefully analyze this situation, while keeping in mind the constraints that are required for the theoretical results to have practical utility.

Figure 2.1 Shannon’s paradigm.

We consider only block processing; the inputs and all intermediate quantities are vector valued, as defined below:

 The initial and reconstructed source words have k components (i.e., the “source symbols”), X = (X1, X2, …, Xk), and ^=(X^1,X^2,…,X^k).

 The channel input and output words have n components (i.e., the “channel symbols”), B = (B1, B2, …, Bn), and Y = (Y1, Y2, …, Yn).

All variables are modeled as random variables and, for generality, are not assumed to be either discrete or continuous. For this reason, following the notations in the studies by Rioul (2007) and Zahir Azami et al. (1996), we use

to simultaneously denote summation, for discrete variables, and integration, for continuous variables (where we omit the measure symbol d(.) for simplicity). With this notation, for example, expectation reads

  (2.1)

This way, we can address a wide variety of sources and channels using a common notation.

The source is characterized by its probability distribution p(x) = p(x1, …, xk). For example, a zero-mean i.i.d. Gaussian source is described by

(x)=1(2πσx2)k/2exp(−‖x‖22σx2),

  (2.2)

where x2 denotes the source variance, and a memoryless binary symmetric source (BSS) is described by the uniform distribution

(x)=12k.

  (2.3)

The channel is described by the transition probabilities p(y|b) that relate the input b to the output y, i.e., the probability distribution of the output variable Y for a given realization of the input b. For example, an additive white Gaussian noise (AWGN) channel is characterized by

(y|b)=1(2πσn2)n/2exp(−‖ y−b ‖22σn2),

  (2.4)

where n2 denotes the noise variance. A binary symmetric channel (BSC) is modeled by its crossover probability p such that

(y|b)=pd(1−p)n−d,

  (2.5)

where d = dH(b, y) denotes the Hamming distance between the channel input and output.

We allow any combination of input and channel types, e.g., a Gaussian signal over a Gaussian channel, a Gaussian signal over a BSC, a binary signal over a Gaussian channel, a binary signal over a Gaussian channel, or even multivalued signals. Unless stated otherwise, the equations we provide hold in all of these cases.

Of course, when mixing input and channel types, one must adapt the source to the channel; this is the role of the encoder. The encoder is described by the mapping b = C(x). Specifying C amounts to designing channel code words characterized by their probability distribution p(b).

Conversely, one needs a decoder to convert the channel output to a reconstructed word in the source domain. The decoder is described by the mapping ^=D(y). Specifying D amounts to designing source code words according to the distribution (x^|x).

The model is not yet complete since important degrees of freedom still remain. For example, when designing the transmission system, one needs to choose the channel input power. While increased channel input power generally yields improved performance (except in a few pathological cases), it comes with practical costs. For this reason, a power constraint is typically adopted. In a similar manner, one needs to decide on an acceptable level of end-to-end reconstruction error ^−X. Various measures can be used to quantify the error, including error probability (when the source is discrete), mean square error (MSE), and so on. The best choice depends on the...

Erscheint lt. Verlag 26.11.2009
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Naturwissenschaften
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
ISBN-10 0-08-092244-9 / 0080922449
ISBN-13 978-0-08-092244-7 / 9780080922447
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 3,2 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 8,4 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
25,19