OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.

Slides:



Advertisements
Similar presentations
Scalable Video Multicast Using Expanding Window Fountain Codes Dejan Vukobratovic´,Vladimir Stankovic´, Dino Sejdinovic´, Lina Stankovic´,Zixiang Xiong.
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Performance analysis of LT codes with different degree distribution
An Easy-to-Decode Network Coding Scheme for Wireless Broadcasting
Digital Fountain Codes V. S
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
Enhancing Secrecy With Channel Knowledge
1 Finite-Length Scaling and Error Floors Abdelaziz Amraoui Andrea Montanari Ruediger Urbanke Tom Richardson.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
1 Scalable Image Transmission Using UEP Optimized LDPC Codes Charly Poulliat, Inbar Fijalkow, David Declercq International Symposium on Image/Video Communications.
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
Sequential Soft Decision Decoding of Reed Solomon Codes Hari Palaiyanur Cornell University Prof. John Komo Clemson University 2003 SURE Program.
Rateless Coding with Feedback Andrew Hagedorn, Sachin Agarwal, David Starobinski, and Ari Trachtenberg Department of ECE, Boston University, MA, USA IEEE.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
Channel Capacity.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Multicast and Unicast Real-Time Video Streaming Over Wireless LANS April. 27 th, 2005 Presented by, Kang Eui Lee.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Multimedia Transmission Over Cognitive Radio Networks using Decode-and-Forward Multi-Relays and Rateless Coding Abdelaali Chaoub, Elhassane Ibn-Elhaj National.
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Computer Science Division
1 Channel Coding (III) Channel Decoding. ECED of 15 Topics today u Viterbi decoding –trellis diagram –surviving path –ending the decoding u Soft.
1 Unequal Error Protection Using Fountain Codes With Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Faculty of Technology,
Timo O. Korhonen, HUT Communication Laboratory 1 Convolutional encoding u Convolutional codes are applied in applications that require good performance.
Codes on Random Geometric Graphs Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with D. Bajović, D. Jakovetić,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Simulation of Finite Geometry LDPC code on the Packet Erasure channel Wu Yuchun July 2007 Huawei Hisi Company Ltd.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
An improved LT encoding scheme with extended chain lengths
A Fault Tolerance Protocol for Uploads: Design and Evaluation
Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Unequal Error Protection for Video Transmission over Wireless Channels
A Block Based MAP Segmentation for Image Compression
Presentation transcript:

OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical and Computer Engineering University of California, San Diego

Page  2 Main Content: “ OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER ” Outline  Transmission problem and motivation.  Background: –Fountain (Rateless) Codes Encoding and Decoding. –Previous Unequal Error Protection (UEP) Rateless codes  Proposed algorithms: Generalized Unequal Error Protection LT Codes –Selection of distributions –Progressive transmission system  Simulation: –Performance comparisons  References

Page  3 Transmission problem:  Point to point transmission: –Transmit information from one sender to another where the erasure channel between the sender and the receiver has a time varying and unknown erasure probability. OBJECTIVE: Transmission rate is close to the capacity of the channel.  Multicast transmission: –Transmit information from one sender to multiple receivers where the channel between sender and the each receiver is an erasure channel with unknown erasure probability. OBJECTIVE: Transmission rate is close to the capacity on all the transmission channels, simultaneously.

Page  4 Motivation  Erasure channels: In a number of communications scenarios, data files sent over the internet are chopped into fixed or variable size packets, and each packet is either received without error or corrupted and therefore considered erased during the transmission.  Solution 1: A way of solving the transmission problem for erasure channels is to use forward error correction. This may lead to inefficient use of network resources when the channel information is missing.  Solution 2: Receivers acknowledge each received packet and senders retransmit the lost packets. This results in low efficiency and the capacity is wasted by feedback messages and retransmissions. The magnitude of the waste is exacerbated in a multicast scenario. B inary E rasure C hannel

Page  5 A solution: “Digital Fountain Idea”  A paradigm for data transmission, without the need for almost any feedback messages.  What is received or lost is of no importance. It only matters whether enough is received.

Page  6 Luby Transform (LT) codes (Luby ‘98)  First known fountain code design.  The basis for other fountain codes: Raptor codes or Online codes.  Send k information symbols. Only n = (1+  )k coded symbols are enough to recover all k information symbols, where  is the overhead.  Asymptotically capacity achieving: –BEC channel have an erasure probability: and capacity is –Number of symbols transmitted: and expected number of reliably received symbols is given by: –Rate of the transmission: –As k gets larger, the goes to 0, and. Thus, LT codes achieves capacity asymptotically.  Low encoding/decoding complexity. [ ■ ] M. Luby, “LT-Codes”, Proc. 43rd Annual IEEE symposium on Foundations of Computer Science, pp , 2002.

Page  7 Encoding…  Finally, we XOR selected information symbols of x to produce the coded symbol.  This process is repeated every time a new coded symbol is desired. Degree Distribution Selection Distribution Example: INFORMATION SYMBOLS CODED SYMBOLS RECEIVED and UNERASED

Page  8 Example: INFORMATION SYMBOLS Encoding…  Finally, we XOR selected information symbols of x to produce the coded symbol.  This process is repeated every time a new coded symbol is desired. Degree Distribution Selection Distribution CODED SYMBOLS RECEIVED and UNERASED

Page  9 Example: INFORMATION SYMBOLS Encoding…  Finally, we XOR selected information symbols of x to produce the coded symbol.  This process is repeated every time a new coded symbol is desired. Degree Distribution Selection Distribution CODED SYMBOLS RECEIVED and UNERASED

Page  10 Example: INFORMATION SYMBOLS Encoding…  Finally, we XOR selected information symbols of x to produce the coded symbol.  This process is repeated every time a new coded symbol is desired. Degree Distribution Selection Distribution CODED SYMBOLS RECEIVED and UNERASED

Page  11 Example: INFORMATION SYMBOLS Encoding…  Finally, we XOR selected information symbols of x to produce the coded symbol.  This process is repeated every time a new coded symbol is desired. Degree Distribution Selection Distribution CODED SYMBOLS RECEIVED and UNERASED

Page  12 Example: INFORMATION SYMBOLS CODED SYMBOLS RECEIVED and UNERASED Encoding…  Finally, we XOR selected information symbols of x to produce the coded symbol.  This process is repeated every time a new coded symbol is desired. Degree Distribution Selection Distribution

Page  13 Decoding…  Coded symbols are sent over a binary erasure channel. Decoder uses a Belief Propagation (BP) algorithm. Figure: n=5

Page  14 How to choose SD and DD?  Ripple is defined to be the set of check nodes of degree 1 in each iteration of the BP.  Thus, in order for BP not to terminate, Ripple has to have at least one element in each iteration. –Luby proposed Soliton distribution that achieves an expected Ripple size 1 in each iteration of BP (POOR in practice). –Robust Soliton Distribution (GOOD in practice: Expected Ripple size > 1 ).  In original LT coding, SD is assumed to be uniform distribution.  OBJECTIVE of the original design: –Given the uniform SD, find the best DD that will achieve the least number of received unerased coded symbols while decoding the whole information block with negligible failure probability.  Original design does not provide Unequal Error Protection (UEP).  In multimedia communications, OBJECTIVE is not necessarily the OBJECTIVE of the original design.

Page  15 Previous UEP Rateless codes:  There are two major studies in literature: –(1) Weighted approach: Modification to SD (skewed SD). Example: r = 2

Page  16 Previous UEP Rateless codes: –(2) Expanding Window Fountain (EWF) codes : a window-specific DD i.e., r different DDs can be used. (MORE FLEXIBLE than weighted approach) Example: r = 2

Page  17 An observation:  Let us observe the following: –Decoding stage 1: A degree-1 check node decodes an information symbol. –Decoding stage 2: Some of the degree-2 check nodes decode two information symbols. –Decoding stage 3: A degree-3 check node decodes an information symbol.  Conclusion: low degree coded symbols decode information symbols earlier (early iterations) in BP.  This can be used for prioritized decoding.

Page  18 Proposed algorithms: Generalized Unequal Error Protection LT Codes - Idea: Degree Dependent Selection Distributions WEIGHTED APPROACH  “Degree dependent selection” idea: WEIGHTED APPROACH –After selecting the degree number for the coded symbol, select the edge connections based on that degree number. –If the degree number is, the information chunks –Since these probabilities must sum to 1 and, there are (r-1)k parameters subject to optimization. EWF APPROACH  “Degree dependent selection” idea: EWF APPROACH –After selecting the degree number for the coded symbol, select the windows based on that degree number. –If the degree number is, the windows

Page  19 Selection of distributions:  Instead of designing all (r-1)k parameters, we introduce a functional dependence to reduce the parameter size.  Number of parameters are reduced to 3(r-1).

Page  20 Selection of distributions: (Luby) (Proposed)

Page  21 Progressive transmission system:  The reason for using such a demultiplexing methodology is that the proposed coding scheme is most powerful when the source bits within each segment have unequal importance.  Using demultiplexing, for example, the information bits in the first block, the most important information block, are equally shared by the segments.

Page  22 Optimization of the rateless code:  Let the BP algorithm iterate M times. The optimization problem is:   are degree and selection distributions of the proposed LT code. This implies that we optimize both of the distributions for a minimum-distortion criterion.  Maximum for M is set to in this study.  The minimization can be done at any iteration index m,  This way, we can present performance as a function of iteration index. This property may particularly be important for portable devices which are constrained by low-complexity receiver structures. We call this property Unequal Iteration Time (UIT) property.

Page  23 Packetization methodology: Fixed packet size k information symbols PACKETS are EITHER RECEIVED or LOST

Page  24 Packetization methodology : Fixed packet size k information symbols PACKETS are EITHER RECEIVED or LOST

Page  25 Packetization methodology : Fixed packet size k information symbols  Therefore, each LT codeword experiences the same erasure pattern. PACKETS are EITHER RECEIVED or LOST

Page  26 Alternative methodology: Variable packet size k information symbols PACKETS are EITHER RECEIVED or LOST

Page  27 Alternative methodology: Variable packet size k information symbols PACKETS are EITHER RECEIVED or LOST

Page  28 Alternative methodology: Overhead Allocation k information symbols

Page  29 Alternative methodology: Overhead Allocation k information symbols

Page  30 Comparisons with “weighted approach” Numerical Results: Comparisons with “weighted approach”  Simulation set-up/parameters: –Take B = source bits ( 512 X 512 Lena image using SPIHT). –Chop it into k equal segments each containing bits. –Treat segments as information symbols and encode using proposed codes to produce coded symbols.  We first compare “weighted approach” with the proposed “UEP GLT” : –Robust Soliton distribution with c=0.01, =0.01. –r = 2 with  k information symbols are treated as the first information chunk, the rest as the second information chunk. –Optimize both systems  optimize their design parameters. “weighted approach”: Only one parameter. We optimize. “UEP GLT” (GLTexp): Three parameters:. For simplicity we set. We optimize two parameters.

Page  31 Comparisons with “weighted approach” Numerical Results: Comparisons with “weighted approach”

Page  32 Comparisons with “weighted approach” Numerical Results: Comparisons with “weighted approach” URT property 166

Page  33 Comparisons with “weighted approach” Numerical Results: Comparisons with “weighted approach” URT property UEP property

Page  34 Comparisons with “weighted approach” Numerical Results: : Comparisons with “weighted approach”

Page  35 Comparisons with “weighted approach” Numerical Results: Comparisons with “weighted approach”

Page  36 Comparisons with “weighted approach” Numerical Results: Comparisons with “weighted approach” UIT property

Page  37 Comparisons with EWF codes Numerical Results: Comparisons with EWF codes  We compare “EWF codes” and the proposed “UEP GLT” : –Number of chunks/windows: r = 2. –Optimize both systems  optimize their design parameters. “EWF codes”: –Two Robust Soliton distribution (RSD) with c =0.01, = Since the window sizes are different RSDs are different. –Two parameters to optimize: Window selection probability, and the chunk size parameter. Let denote the optimal parameters of the EWF code. “UEP GLT”: –Use the compound degree distribution obtained by convex combination of the two RSDs used for EWF codes above. –GLTexp: This system uses and. –GLTexpOpt: This system uses only. –GLTexpFullOpt: No constraints. Five parameters to optimize:.

Page  38 Comparisons with EWF codes Numerical Results: Comparisons with EWF codes

Page  39 Comparisons with EWF codes Numerical Results: Comparisons with EWF codes URT property UEP property

Page  40 Optimal parameters Numerical Results: Optimal parameters k PSNR(dB) 100 “weighted approach” N/A N/A28.05 GLTexp PSNR(dB) 1000 “weighted approach” N/A N/A30.39 GLTexp k=100,  = 0.4 PSNR(dB) UEPEWF 0.5N/A GLTexpOpt

Page  41 References: [1] M. Luby, ``LT-Codes", Proc. 43rd Annual IEEE symposium on Foundations of Computer Sciencel, pp , [2] A. Shokrollahi, “Raptor codes,” IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2410–2423, Jun [3] N. Rahnavard and F. Fekri, “Finite-Length Unequal Error Protection Rateless Codes: Design and Analysis", IEEE Globecom [4] N. Rahnavard, Badri N. Vellambi and F. Fekri, “Rateless Codes with Unequal Protection Property", IEEE Trans. Inf. Theory, Vol. 53, No. 4, pp , April [5] D. Sejdinovic, D. Vukobratovic, A. Doufexi, V. Senk and R. Piechocki, “Expanding window Fountain codes for Unequal Error Protection", Proc. 41st Asilomar Conf., Pacific Grovem pp , [6] D. Vukobratovic, V. Stankovic, D. Sejdinovic, L. Stankovic and Z. Xiong, “Scalable Video Multicast using Expanding Window Fountain Codes”, IEEE Trans. on Multimedia., Vol. 11, No. 6, pp. 1094–1104, Oct [7] M. Luby, Mitzenmacher, and A. Shokrallahi, “Analysis of random processes via and-or tree evaluation," in Proc. 9th Ann. ACM-SIAM Symp. Discrete Algorithms, 1998, pp

Page  42  Questions ?