INFORMATION SIGNAL, APPARATUS AND METHOD FOR
ENCODING AN INFORMATION CONTENT, AND APPARATUS AND METHOD
FOR ERROR CORRECTING AN INFORMATION SIGNAL
TECHNICAL FIELD
The present application relates to information signals,
such as media signals, encoding information content and the
error correction of such information signals.
BACKGROUND
Media transmission is affected by information loss due to
transmission errors in many transmission channels without
Quality of Service (QoS)
One example of a media stream is a video bit stream Due to
the spatial and temporal dependency structure of modern
video codecs like H.264/AVC or especially the scalable
extension of H 264/AVC (SVC) [Al], the effect of losses on
the decoded video quality mainly depends on which parts of
the bit stream are affected.
In unidirectional channels forward error correction (FEC)
technologies can be used to combat this losses. Many
protection schemes have been proposed addressing this issue
like unequal error protection (UEP) [A5] or priority
encoding transmission (PET)' [B3] Both approaches give more
protection to lower and more important layers But first in
[A2] it has been recognized, that generating protection
over all depending layers also redundancy symbols of upper
layers can help increasing protection for lower layers
This can be very beneficial in transmission schemes where
multiple layers of a scalable video stream are transmitted
simultaneous like e g layered multicast [A6]
Various dependency structures can be considered One
particular important dependency structure is introduced by
motion compensation, where a reference picture is used to
predict another picture If a referenced picture or a slice
of that reference picture is lost, pictures and slices that
are referencing it are affected too. Therefore, in a
sequence of pictures that reference each other, the first
pictures in the chain are most important A loss at some
point typically affects all succeeding pictures in some
way Hence, it is desirable to protect as many pictures as
possible in such a dependency chain
Another set of dependency structures is introduced by SVC,
where a base-layer is referenced by an enhancement layer
This enhancement layer can be further referenced by another
enhancement layer and so on Let 1 be the identifier of a
layer out of 0 to L-l, where J = 0 is the base layer, 1=1
identifies the first enhancement layer referencing the base
layer In SVC, the loss of any layer x leads to unusable
decoding results for all layers 1 > x referencing x
Therefore, priority must be given to correctly obtaining
any layer < J when a certain quality is requested,
represented by a particular value of 1
Forward error correction (FEC) can be used to enhance
reliability of media transmission over non-QoS channels
Independent FEC protection as used by nowadays schemes of
an enhancement layers does not take the relation of layers
into account In such a scheme, typically for a number of k
source symbols, a number of p=n-k redundancy symbols are
generated Let us assume the usage of a maximum distance
separable (MDS) FEC code, so that each number of erasures
of symbols smaller or equal to p can be overcome Even,
when using stronger FEC protection (more redundancy
symbols) for the more important lower layers (this is also
known as unequal error protection) , there is no guarantee,
that in any error condition the reconstruction of
relatively stronger protected layers is of higher
probability than for less strong protected layers.
If a lower layer is lost, higher enhancement layers cannot
be decoded due to missing references as depicted in Figure
19 In this example layer > 1 at time t is lost due to
transmission error ("error"), so that layers with I > 1 can
not be decoded Successfully received FEC protection of
enhancement layers is useless.
SUMMARY
Thus, it is an object of the present invention to provide a
forward error correction scheme that allows for a more
effective and/or safe protection of scalable information
signals.
According to an embodiment an information signal being
scalable in a plurality of dimensions so that portions
thereof represent information content at different
constellations of levels of the plurality of dimensions,
may be build such that
at least a first one of the plurality of portions
representing the information content at a level of a first
one of the plurality of dimensions higher than a level in
the first dimension at which a second one of the plurality
of portions represents the information content, overlaps
with the second portion,
at least a third one of the plurality of portions being
different from the first portion and representing the
information content at a level of a second one of the
plurality of dimensions higher than a level in the second
dimensions at which a fourth one of the plurality of
portions represents the information content, overlaps with
the fourth portion, and
the information signal is FEC protected by each of the
different constellations having redundancy information
associated therewith such that
each redundancy information is dependent on the
respective portion representing the information
content at the respective constellation,
the redundancy information associated with the
constellation at which the first portion represents
the information content is dependent on the first
portion including a part thereof overlapping the
second portion, and
the redundancy information associated with the
constellation at which the third portion represents
the information content is dependent on the third
portion including a part thereof overlapping the
fourth portion
According to a further embodiment encoding an information
content into an information signal being scalable in a
plurality of dimensions so that portions thereof represent
the information content at different constellations of
levels of the plurality of dimensions, may comprise
generating the plurality of portions so that at least a
first one of the plurality of portions representing the
information content at a level of a first one of the
plurality of dimensions higher than a level in the first
dimension at which a second one of the plurality of
portions represents the information content, overlaps with
the second portion, and that at least a third one of the
plurality of portions being different to the first portion
and representing the information content at a level of a
second one of the plurality of dimensions higher than a
level in the second dimensions at which a fourth one of the
plurality of portions represents the information content,
overlaps with the fourth portion, and
'l
t
FEC protecting the information signal by associating
redundancy information to e|ach of the different
constellations such that '
each redundancy information is dependent on the
respective portion representing the information
content at the respective constellation,
the redundancy information associated with the
constellation at which the first portion represents
the information content is dependent on the first
portion including a part thereof overlapping the
second portion, and
the redundancy information associated with the
constellation at which the third portion represents
the information content is dependent on the third
portion including a part thereof overlapping the
fourth portion.
According to a further embodiment an information signal
representing an information content and being scalable so
that portions thereof represent a time instant of the
information content at different levels of quality, may be
build such that
at least a first one of the plurality of portions
representing the information content at a first one of the
different levels higher than a second one of the different
levels at which a second one of the plurality of portions
represents the information content, overlaps with the
second portion, and
the information signal is FEC protected by each of the
different levels having redundancy information associated
therewith such that
each redundancy information is dependent on the
respective portion representing the information
content at the respective level, and
the redundancy information associated with the first
level is dependent on the first portion including a
part thereof overlapping the second portion.
According to a further embodiment encoding an information
content into an information signal representing the
information content and being scalable so that portions
thereof represent a time instant of the information content
at different levels of quality, may comprise
generating the plurality of portions so that at least a
first one of the plurality of portions representing the
information content at a first one of the different levels
higher than a second one of the different levels at which a
second one of the plurality of portions represents the
information content, overlaps with the second portion; and
FEC protecting the information signal by associating
redundancy information to each of the different levels such
that
each redundancy information is dependent on the
respective portion representing the information
content at the respective level, and
the redundancy information associated with the first
level is dependent on the first portion including a
part thereof overlapping the second portion
According to a further embodiment error correcting an
information signal being scalable so that portions thereof
represent an information content at different levels of
quality, wherein at least a 'first one of the plurality of
portions representing the information content at a first
one of the different levels higher than a second one of the
different levels at which a second one of the plurality of
portions represents the information content, overlaps with
the second portion, wherein the information signal is FEC
i
protected by each of the different levels having redundancy
i
information associated therewith such that each redundancy '
information is dependent on the respective portion
representing the information content at the respective
level, and the redundancy information associated with the
first level is dependent oh the first portion including a
part thereof overlapping the second portion, the apparatus
may comprise.
correcting an error of the information signal within the
second portion by use of the redundancy information
associated with the first and second levels and a part of
the first portion disjoint to the second portion, and
deriving the information content at the second level of
quality from the error corrected second portion with
discarding the part of the first portion
According to a further embodiment an information signal
representing a 3D and/or audio information content and
being scalable so that portions thereof represent the
information content at different levels of quality, may be
build such that
at least a first one of the,plurality of portions
representing the information content at a first one of the
different levels higher than a second one of the different
levels at which a second one of the plurality of portions
represents the information content, overlaps with the
second portion,
the information signal is FEC protected by each of the
different levels having redundancy information associated
therewith such that
each redundancy information is dependent on the
respective portion representing the information
content at the respective level, and
the redundancy information associated with the first
level is dependent on the first portion including a
part thereof overlapping the second portion
According to a further embodiment encoding an 3D and/or
audio information content into an information signal
representing the 3D and/or''audio information content and
being scalable so that portions thereof represent the 3D
and/or audio information content at different levels of
quality, may comprise 'I
i
generating the plurality of'portions so that at least a
first one of the plurality of portions representing the
information content at a first one of the different levels
higher than a second one of the different levels at which a
i
second one of the plurality of portions represents the
information content, overlaps with the second portion, and
FEC protecting the information signal by associating
redundancy information to each of the different levels such
that
i
each redundancy information is dependent on the
respective portion representing the information
content at the respective level, and
1
I
the redundancy information associated with the first
level is dependent on the first portion including a
part thereof overlapping the second portion
The present invention is based on, inter alias, the finding
that a scalable information signal may be protected in a
more efficient and/or safe way by adopting the inter-
I
relationship among the plurality of portions of different
levels within the information signal in FEC protecting the "
information signal In 'particular, portions of the
information signal representing the information content at
a higher level should have associated therewith redundancy
information which is dependent not only on that part of
this portion being disjoint to a respective overlapping
lower level portion Rather;, redundancy information should
also be dependent on the latter part so as to increase the
chances of success of forward error correcting an error
within the lower level portion at the reception side
Further, the effect of an increase in the correction
probability is enhanced when transferring the above finding
to more than one scalability dimension of a multiple
scalable information signal.
i
In other words, without having to increase the amount of
redundancy information, the probability of an errorless
reconstruction of the information content at any of the
possible levels of quality may be increased. In even other
words, it is possible to maintain the probability of a
proper reconstruction even' with decreasing the necessary
amount of redundancy information within the information
signal.
BRIEF DESCRIPTION OF THE DRAWINGS
!
•|
In the following, embodiments are described in detail with
respect to the figures, among which
i'
I1
Figs, la - lc show schematics of different examples for
two-dimensionally scalable information signals for
i
illustration purposes,,
Fig 2 shows a block diagram of an encoding
apparatus according to an embodiment;
Fig 3 shows a flow diagram of a correction method
according to an embodiment;
Fig 4 shows a flow diagram of a method for an
error correction according to a further embodiment,
Fig 5 shows a '• schematic illustrating the
correspondence between the inter-relationship among
the different layers 'of a multi-layered information
signal on the one hand and the dependency of the
redundancy information on the different portions on
l
the other hand, according to an embodiment,
i
Fig 6 shows a schematise for illustrating an encoding
example for layered FEC with two layers, using an
XORing code, j
Fig 7 shows a schematic for illustrating a possible
layered FEC with exemplary L dependency layers,
Fig 8 shows a schematic for illustrating a decoding
example for layered FEC with two layers, using an
XORing code.
Fig 9 shows a schematic illustrating a possible
dependency structure o|f an SVC signal,
Fig. 10 shows a schematic for illustrating possible
decoding constellations with layered FEC and
multidimensional dependency structures according to an
embodiment,
Fig. 11 shows a schematic of an information signal with
illustrating an exemplarily occurring error burst,
Fig 12 shows an example for a possible generator matrix
for layered LT-encoding,
1
Fig. 13 shows a possible' pre-coding matrix for a layered
systematic Raptor-code,
: >
i
i ;
Fig 14 shows an example ,for an LT-code encoding matrix
GLT; i'
Fig. 15 shows a pre-coding matrix GpSys of Raptor-codes,
Fig. 16 shows a possible, layered LT encoding matrix GLTo
and GiayeredLT (1) for two dependency layers,
i
Fig 17 shows a possible layered pre-coding matrix
Gpsys(O) and Giayeredpsys (1) for two dependency layers,
t
i
Fig. 18 shows a histogram plot illustrating a performance
of a Raptor-code with k=1200 source symbols and n=20
encoding symbols of size t=48 byte; and
Fig 19 shows a schematic illustrating enhancement layers
not being decodable due to lost references in lower
layers
DETAILED DESCRIPTION
!
The following detailed description of embodiments starts
with a presentation of possible 2-dimensionally scalable
information signals with: respect to Figs la-lc By
referring to these illustrative information signals,
embodiments for an information signal protection at the
encoder side and a possible error correction at a reception
side are then described with respect to Figs 2-4 However,
the embodiments described in the following with respect to
Figs 2-18 are not restricted to 2-dimensionally scalable
information signals. Rather, the information signal may
exhibit more than two scalability dimensions or even merely
one scalability dimension ['
In the following description of Figs 1-4, the examples for
information signals are not'restricted to any application,
such as video, audio or the like In general, these
embodiments are applicable ! to many types of information
signals showing scalability as it is described m the
following in more detail Accordingly, although the
subsequent description of Figs 5-18 sometimes focuses on
the scalable video coding, even most of the aspects
described with regard to these figures are transferable to
other kinds of information signals as well Moreover, in
the description of the Fig's. 1-4, the scalability of an
information signal is described to be the property of an
information signal to represent an information content at
different levels of quality. In effect, a scalable
information signal may thus be viewed as a layered
information signal with each layer corresponding to a
certain level of representation quality. Accordingly, in
the subsequent description of Figs 5-18, some of the
principles described with respect to Figs. 1-4 are
referenced by "layered FEC"
Fig la shows an example for an information signal being
scalable so that portions thereof represent information
content at different levels of quality The information
signal 10 is illustrated on the left-hand side of Fig la
In particular, the information signal is illustrated as a
rectangle The area circumscribed by the rectangle shall
i
correspond to the amount ,of data within the information
signal However, although! the information signal 10 is
illustrated as a 2-dimensional area, the data structure of
the information signal shall not be restricted by this kind
of illustration Rather, the information signal may be a
linear data stream in a packetized or non-packetized
format The 2-dimensional representation of the information
signal 10 in Fig la has merely been used in order to more
clearly illustrate the way, in which the information signal
10 provides for a scalable 'representation of an information
content in two scalable dimensions
T
In particular, four different portions of the information
signal 10 are shown in Fig J | la. The first portion is shown ■
by the continuous line ' 10, with this portion 10
encompassing the whole information signal. The other three
portions 10a, 10b and 10c are proper subsets of the
information signal 10. Each of these sub-portions lOa-lOc
allows for a reconstruction of a representation of the
information content, however, at a reduced level of quality
compared to the whole information signal 10 In particular,
sub-portion 10a represents the information content at a
level 0 along a first scalability dimension 12 This level
is lower than level 1 in the same scalability dimension
direction 12, at which the whole information signal 10
represents the information content. Similarly, sub-portion
10b allows for a reconstruction of the information content
at a level 0 in a second scalability dimension 14, which is
lower than a level 1 at which the information content is
represented when reconstructed based on the whole
information signal. '
Similar to the relationship between the whole information
signal on the one hand, and1 the sub-portions 10a and 10b on
the other hand, sub-portion 10c allows for a reconstruction
of the information content at a level lower than achievable
by use of any of sub-portions 10a and 10b, respectively, in
any of the two scalability dimensions 12 and 14. In
particular, according to the illustrative embodiment of
Fig la, the whole information signal allows for a
reconstruction of the information content at the higher
level of 1 in both scalability dimensions 12 and 14, while
sub-portion 10c merely allows for a reconstruction of the
information content at the lower level 0 in both
scalability dimensions 12 and 14. The other sub-portions
10a and 10b are in between, in that they allow for a
reconstruction of the information content at the higher
level of 1 in one of the scalability dimensions 12 and 14,
and at the lower level in' the other of both scalability
dimensions 12 and 14, as it is illustrated on the right-
hand side of Fig. la.
As it is shown in Fig la, /the sub-portion 10c is a proper
subset of both portions 10a and 10b. By this measure, the
lower quality data within portion 10c is "re-used" in the
higher level portions 10ai , 10b and 10 respectively, in •
order to re-fine this lower quality data to enable a
reconstruction of the information content at a higher level
in any of the scalability dimensions 12 and 14, relative to
portion 10c. Due to this, 'the data within portion 10c may
be seen as more important than data outside this portion
10c. In particular, if the data within portion 10c is
somehow corrupted, the information content is not correctly
reconstructable, even at the lowest constellation of levels
in the two dimensions 12 and 14 This is also true for the
higher levels, due to their dependency on the data within
portion 10c Data loss outside portion 10c, however, does
not hinder a reconstruction of the information content at,
at least, the lowest constellation 00
For the sake of completeness only, it is noted that each of
the above-mentioned portions 10 and lOa-lOc may represent
individually decodable portions of the information signal
in that each portion is self-contained to reconstruct the
information content at the respective quality constellation
without necessitating any information on data outside the
respective portion Further, the portions 10, 10a, 10b and
10c may be defined such that any data loss within the
respective portion leads to an incorrect reconstruction of
the information content I compared to the quality
constellation of the respective portion
In the example of Fig la, the information signal 10 was
scalable in two dimensions such that for each level at
which the information content was reconstructable in one
dimension, full scalability was provided in the other
dimension. However, this needs not necessarily be the case.
For example, Fig lb shows, an example of an information
j
signal where the number of levels in the scalability
dimension 12 is different from the number of levels in the
otner scalability dimension;14 To be more precise, while
in Fig la, the four portions 10 and lOa-lOc corresponded
to the four constellation points 10, 01, 00 and 11 shown on
the right-hand of Fig. la, ,,the information signal of Fig
lb has five portions corresponding to the constellation
points 00, 01, 02, 11 and 12 shown on the right-hand side
of Fig lb |
Although in Fig lb, each constellation point at the higher
level of tne second scalability dimension 14 has a
corresponding constellation point at the same level along
the first scalability dimension 12, but at the lower level
0 in the second scalability dimension 14, this is also not
necessary For example, Fig. lc shows a case where the
smallest sub-portion representing the information content
at the level 0 along the both scalability dimensions 12 and
14, i.e at the constellation 00, is the only portion
providing level 0 in the first dimension 12. Similarly,
constellation point 11 is the only constellation point at
level 1 along the first scalability dimension 12
By looking at Figs la-lc it becomes clear that the
intersection between the higher level portions such as, for
example, 10, 10a and 10b in Fig la, on the one hand, and
the lower level portion 10c, on the other hand, not
necessarily has to be equal for each of these high level
portions. Rather, as it is shown in Fig lc, for example,
the intersection itself may not be a member of the
plurality of portions of the information signal Moreover,
it is noted that a portion of a level lower than that of
another portion in at least one of the scalability
dimensions does not necessarily have to be a proper subset
of the latter portion, as it is commonly shown in Figs la-
lc with respect to the smallest portion, respectively
Rather, the intersection between higher level portions and
lower level portions may be such that the lower level
portion merely partially j overlaps with the respective
higher level portion I!
t
;!
The embodiments described below with respect to Figs. 2-4,
adopt the above outlined dependency among the portions of
the scalable information 'signal in FEC protecting the
information signal and performing forward error correction
on received versions of the information signal,
respectively. In general, ! higher level or higher layer
portions, i.e portions ' representing the information
content at a higher leveli in at least one scalability
dimension, are associated with respective redundancy
information which is not only dependent on the part of the
respective portion being disjoint to overlapping lower
level portions, but also on the part overlapping with the
latter portions
Fig 2 shows an apparatus 20 for encoding an information
content. The apparatus 20 comprises an input 22 for
receiving the information content and an output 24 for a
protected scalable information signal Internally,
apparatus 20 comprises a portion generator 26 representing
a means for generating the portions of the informations
signal, an FEC protector 28 representing a means for FEC
protecting the information signal and a multiplexer 30,
which are serially connected in the order mentioned between
the input 22 and output 24 •
The portion generator 2 6 is configured to encode the
information content 22 into scalable data such as the
information signal data shown in Figs la-lc, however, in
an unprotected format For example, the portion generator
2 6 may be configured to lossy compress the information
content 22 in order to obtain lowest level or lowest layer
portion data 32a such as, for example, x0o To this end,
portion generator 26 has, for example, reduced the quality
of the information content 22 and then encoded the
]
information content in its reduced quality. In this case,
the portion generator 26 may be configured to accompany
this lowest layer portion ,32a by disjoint higher level
portion data 32b which enables, in combination with the
lowest level portion data 32a, an increase of the
reconstructable quality in certain levels and in one or
several scalability dimensions For ease of understanding
only, four different portions are shown to be output by
portion generator 26, with these portions exemplanly
corresponding to the configuration of Fig la However,
differing frcm the representation of Figs la-lc, the
portion data output by portion generator 26 is understood
to be non-overlapping That is, the portion data x0i output
by portion generator 2 6 shall encompass only that part of
the data being necessary for that constellation xoi, which
is disjoint to the lower level portion data of the lower
level portion XQO, I e the upper right-hand corner of
rectangle 10 in Fig la Similarly, the portion data for
constellation Xio output by portion generator 2 6 shall
encompass only data within portion 10b of Fig la, which
does not overlap the lower layer portion 10c. And the
highest level portion data xn output by portion generator
26 shall, in turn, only encompass data of the information
signal of Figs la-lc not being included by any of the sub-
portions .
The unprotected plurality of disjoint portions is then FEC
protected by FEC protector 28 In particular, the FEC
protector 28 comprises a plurality of modules 28a-d, each
module 28a-28d being uniquely associated to a different one
of the portions output by 'portion generator 26, or the a
different one of the quality levels/layers to which the
portions correspond Each ''module 28a-d performers an FEC
protection on its respective portion data However, in
addition to the respective disjoint portion data, each
module 28a-d receives data of lower level portions
contributing or being necessary for the respective quality
level. For example, module '28b is associated with quality
!
constellation x0i and receives the disjoint portion data xoi
output by portion generator'j 2 6 along with the lowest level
portion data 32a. By this measure, module 28d receives the
whole portion data 10a (Fig la) . Thus, each module 28a-d
performs the FEC protection on all data necessary for '
reconstructing the information content at the respective
level of quality to which 'the associated portion data of
the that module is assigned. In other words, each of the
modules 28a-d is, in effect, associated to a different one
of the quality levels or quality constellations in units of
which the unprotected information signal output by portion
generator 26 is scalable, and each of these modules
performs the FEC protection on all data participating or
being necessary for the respective quality level or quality
constellation Thus, the redundancy information which
module 28b, for example, associates with the higher level
portion data xoi also depends on and protects the lower
level portion data 32a, for example.
Each module 28a-d outputs the respective disjoint portion
data along with the respective redundancy information
obtained by the respective FEC protection Although
examples for FEC protection used by FEC protector 28 are
described in the following description in more detail, it
is noted that FEC protector 28 and its modules 28a-d,
respectively, may, for example, use a systematic code for
the redundancy information generation. However it is also
possiole that the FEC modu'les 28a-d use a non-systematic
code in that they map the data received such that the lower
portions' data are used for creating encoded code words
representing the respective portion data associated with
the respective module mixed-up with the redundancy
information in an non-systematic way An example for such a
non-systematic code is given in the following by an LT
code
The multiplexer 30 receives the protected portions from the
FEC protector 28 and multiplexes them into the protected
I!
information signal 24 offerang the same scalability as the
unprotected information signal output by portion generator
2 6, but in a protected manner Each of these protected
higher level disjoint portions has redundancy information
"i
that protects also protected disjoint portions of lower
levels Still, the various, overlapping portions of th'e
protected information signjal at output 24 which enable
reconstruction at different levels are individually
decodable in order to enable the reconstruction of the
information content at the respective level without
'I
necessitating any information from the remainder of the
'■I
protected information sign'al The protected information
i'
signal 24 may be arranged in consecutive time frames as a
data stream wherein each protected disjoint portion may
i
assume a continuous portion of this data stream so that the
i1'
respective redundancy information is close to the
respective disjoint portion' •
•!!
The protected information signal thus generated by
apparatus 20 may be error ''corrected at reception site by
use of the method shown in ]Fig. 3
I <
'i
The method of Fig. 3 begins with step 50, where a level
portion is extracted from the protected information signal
along with its associated redundancy information For
example, the first time step 50 is performed, the lowest
level protected portion is extracted from the protected
information signal, i.e. portion 10c of Fig la along with
its redundancy information Thereafter, in step 52, a
forward error detection or forward error correction is
' i
performed on the extracted {portion based on the associated
n
redundancy information Depending on the severeness of
errors occurring in the data extracted in step 50, the
forward error correction step 52 is successful or not In
step 54, it is checked as/ to whether the forward error
,j
correction in step 52 has feeen successful or not. If not,
ii
the process proceeds with step 56, where it is checked as
i
to whether further redundancy information depending on or
i t
t
protecting the extracted portion is available from higher
level portions For example, if the currently extracted
portion is 10c in Fig la, the check in step 56 reveals
that the redundancy information of portions 10a and 10b
also protects portion 10c. If such further redundancy
information exists, a further attempt of a forward error
correction is performed in step 58 by additionally using
the further redundancy information and the higher level
portion identified in step' 56 Thereafter, the check in
step 54 is performed ag'ain. If, in step 56, it is
determined that no further redundancy information exists,
the correction has failed and the method ends up with an
error 60
However, the conditional attempt 58 increases the
probability of a successful error correction of the
extracted portion. If the check in step 54 reveals a
successful correction, the method proceeds to step 62,
where it is checked as to whether a higher level of quality
is requested by, for example, a user or a default setting
at the receiver If yes, the method proceeds with step 50,
l e. by extracting the next level portion Naturally, this
extraction may be restricted to disjoint parts of the next
level portion, l e. the part of the next level portion
disjoint to the previous portions having previously been
extracted Moreover, the extraction may already have been
performed within step 58, in which case a re-extraction may
be skipped alsc However, if the check in step 62 reveals
that no higher level is requested, the information content
is derived from the extracted and eventually forward error
corrected portion at the requested level in step 64,
whereupon the method ends successfully at 66
According to Fig 3, the error correction of a lower level
portion is firstly restricted to the associated redundancy
information. In other words, a first attempt is performed
in order to error correct this portion by use of its
associated redundancy information only Merely in case of a
miss, redundancy information of higher level portions is
used additionally Of course, according to a simpler
approach, shown in Fig 4, , the redundancy information of
higher level portions may be used instantaneously in order '
to participate in the error detection and error correction
of lower level portions. Fig 4 shows such a procedure In
a step 70, an error of the information signal within the
portion of the requested level is corrected by use of the
redundancy information associated with the requested level
along with redundancy information associated with higher
levels and a part of the higher level portions disjoint to
i |
the requested level portion For example, in order to
correct errors within portion 10c in Fig. la, in step 70 an
error correction is performed by use of not only the
redundancy information associated with portion 10c, but
also with the redundancy information associated with
portion 10a and/or 10b in trie part of the respective higher
level portion 10a and 10b, respectively, disjoint to lower
level portion 10c Thereafter, in step 72 the information
content at the requested level is derived from the error
corrected portion by discarding the part of the higher
level portions disjoint to the requested level portion
i
Before starting with the description of the following
Figures, it is noted as a precautionary measure that a
scalable information signal applicable to the embodiments
of Figs. 2 to 4 may show scalability in a higher number of
dimensions than used or adopted in the provision of the FEC
data In other words, the dependencies of the information
signal adopted when creating the FEC data may involve
merely a proper subset of the scalability dimensions of the
information signal. By referring to Fig. la to lc, for
example, the layered FEC described above and described in
more detail below may be restricted to only one of the two
dimensions 12 and 14 J
)■
i
The above embodiments were jdescribed without restriction to
any kind of application, such as video coding or the like
Moreover, the kind of forward error correction used for
protecting the individual ' quality levels has not been
discussed in detail The,.'same applies to the kind of
scalability or the different possibilities for scalability
dimensions Examples for these terms may be derived from
the following embodiments, the description of which
sometimes refers back to any of Figs. 1-4. In particular,
the following embodiments ■ are sometimes exemplified b'y
reverting to media streams, in particular video bit
streams The embodiments described in the following also
use the layered forward error correction outlined above in
that FEC protection for each higher layer of a scalable
video codec is concatenated. However, although the
following embodiments mainly refer to scalable video
coding, same embodiments could also be applied to any data
representation including scalable audio, computer graphics
data and scene descriptions, where a subset of the data
i
relies on the correctness of another subset of the data
<
Fig 5, for example, shows an example for a dependency
structure of a media stream A media stream is arranged in
consecutive time frames, with time frames 0, t and 2t being
shown in Fig 5 The media stream is shown to be multi-
layered In particular, the media stream has L dependency
layers The lowest dependency layer 0 may be thought of
corresponding to the level ,0 along axis 14 of Fig. lb, with
dependency layer 1 corresponding to the level 1 along this
axis, the dependency level 2 corresponding to level 2
According to Fig 5, redundancy symbols for an enhancement
layer are calculated over the source symbols of all
subjacent referenced layers like depicted in example FEC
construction in Fig 5 Additional protection is added to
lower layers without increasing the overall amount of FEC
redundancy symbols of the whole media stream, I e for all
layers The double-headed arrows in Fig 5 show which
layers are used for FEC redundancy symbol generation. The
maximum number of dependency layers is L in this example
!
I ,
FEC redundancy symbols for the lowest layer Layer 0 (FEC 0)
are generated given by some, FEC coding technique T FEC 1
(layer 1) symbols are generated over source symbols of
layer 0 and layer 1 whereas FEC 2 (layer 2) symbols are
generated over source symbols of layer 0, layer 1 and layer <
2 and so on, up to FEC L-l which is generated over all
layers 0 to L-l The generations of these FEC symbols may
be performed by the modules 'shown in Fig 2
FEC 0 symbols can independently be used for the decoding of
FEC scheme T Layer 1 may only be corrected in combination
with layer 0 Redundancy symbols of both layers are used in
a combined way for reconstructing layer 1 and layer 0
together If there are not more symbols lost than the sum
of transmitted symbols FEC 0 and FEC 1, both layers can be
reconstructed, I e a symbol loss in the base layer higher
than the base layer redundancy symbols FEC 0, can be
overcome, if there are enough redundancy symbols FEC 1 left
in layer 1 for reconstructing both layers The sum of all
transmitted symbols nj of layer 1 and all transmitted
symbols n2 of layer 2 must be higher or equal to ki + k2
The layered FEC of Fig 5 thus exploits existing
dependencies in a bit stream to generate layer
comprehensive redundancy or parity symbols in upper layers
with 1 > 0 by calculating redundancy symbols for an
enhancement layer over the source symbols of all subjacent
referenced layers like depicted in example FEC construction
in Fig. 5, with the double
iok-i} results in redundancy symbols
(here bits) Po={poif . • , PoA-k) • To construct a systematic
code word, Po is concatenated with Io building code word
Co , m the following sometimes called Constellation 0 In
the example in Fig 5 and Fig. 3, n-k=2 has been used for
illustrative reasons
i
i
i
The bits in the set Pi of dependency layer 1 are calculated
in Constellation 1 over source symbols of dependency layer
1 and subjacent layer 0, l e in combination with source
symbols of layer 0 on which layer 1 depends on Therefore,
the redundancy vector Pi is an XOR combination of Io and Ii
The systematic code word Ci\is a concatenation of source
bits Ii and Pi Fig 6 depicts encoding of two dependency
layers with the thus embodied layered FEC
Due to the additional XORing combinations of the layered
FEC approach redundancy symbols (bits) of different layers
can be combined to correct erasures in source symbols of
all layers included in Constellations
'I
If L is the number of dependency layers, then Fig 7
depicts all possible encoding and decoding Constellations 0
to L-l depending on number of available layers L
t
i
If there are errors in Layer 0, each Constellation can be
used for error correction1 (see step 70) For a lower
''computation complexity the"'' lowest Constellation 0 may be
,"
tried first for correcting errors (see Fig 6). If it fails
(step 54), the next Constellation 1 is tried (step 58) and
so on. If the last Constellation L-l fails too, the errors
i ,
in layer 0 cannot be corrected (step 60) If, on the other
! I
hand, layer 0 can be reconstructed data may be used for
decoding higher Constellations but do not give any
protection gain due to no XORing connections from lower to
upper layers. In other I; words, if layer 0 can be
reconstructed, the data in Constellation 1 can be used to
reconstruct layer 1
Exemplified decoding referring to encoding example in Fig
6 is depicted in Fig 8 If pi= ni - ki is the number of
redundancy or parity symbols in layer I and ei is the
number of lost symbols in layer 1 and each redundancy
symbol is able to correct one lost symbol out of
transmitted symbols of layer I and all lower layers, then
the layers can be decoded if:
i
Constellation 0 for 1 layer
I
Constellation 1 for 2 successive layers
Constellation 2 for 3 successive layers.
Constellation L-l for L-l successive layers
The number of parity symbols p+o for layer 0 in each
constellation can be calculated as follows.
Constellation 0 ,
P+o = Po
Constellation 1 ;
P+o =Po+(Pi-e\) lf(j>\ ^e.) j
Constellation^-
P+o =Po+(P2 ~e2)+(Pi ~e\) tfiPi ^e2)&{p2 + px >e2 +ex)
Constellation L-l.
Protection increase of enhancement layers 1 > 0 can be
decoded in the same way beside that protection of lower
layers can not be used and successful decoding of lower
layers is a requirement
Fig 8 depicts a decoding example with two layers. It is
assumed, for example, that the encoder-side applied XOR
combinations are known at the receiver Erasures can the be
corrected in the following way Assume Ro= (0r>r>'?l) is the
received code word for layer 0 and Ri= (11011) for layer 1
The symbol "?" stands for a lost bit In Constellation 0,
the method and apparatus tries (step 52) to decode layer 0
with FEC 0 parity bits Only bit 102 can be corrected, and
the other bit i01 cannot be corrected due to insufficient
parity bits. In next step (cp. step 58), the attempt is
made to decode Constellation 1 combining FEC 0 and FEC 1
With concatenation to upper layers, the lost bit can be
corrected and both layers can be successfully decoded (step
64)
j!
The layered FEC thus described adds additional dependencies
i i|
in upper layers parity |ifcits. But due to the layer
dependencies, correctly re'qeived higher enhancement layers
| hi
are worthless without correcjt lower layers.
MI
I rl
In the following, embodiments for multidimensional layered
FED with scalable media streams are presented When the <
above described layered 'FEC is extended by allowing
different layered FEC encodings at the same time over
different dimensions of scalable media, this is called
multidimensional layered FEC (MDL FEC) in the following
Due to the scalability options of modern scalable media
coding standards like SVC, [Al] [A3] [A4], dependencies
within the media stream can have multiple scalable
dimensions E g. for an SVC, media stream, the SNR quality,
the frame rate as well as the resolution of the decode-able
video may be changed at the same time by adding or removing
layers Fig. 9 illustrates a possible SVC dependency
structure according to which a video signal provides
temporal resolution, scalability in four levels, bit rate
or SNR scalability in four' levels and spatial resolution
scalability in three levels The individual blocks shown
shall indicate disjoint portions of the SVC signal wherein
the arrows therebetween point from higher level portions to
lower levels portions from which the first ones depend.
In other words, layered FEC can be used for multi dimension
dependency structures ^Redundancy symbols may be
constructed over all depending layers Let LD be the number
of layers of scalability dimension D Fig. 10 exemplarily
depicts possible MDL FEC constellation for D=3 However,
any number of dimensions D''> 3 is also possible, as well as
any number of dimensions Dlsmaller than D=2
1 i
In Fig 10, the base layer ,is exemplarily included in all
FEC constructions This complies with the embodiments shown
in Figs la-lc Therefore there are multiple paths for
successful error correction. The MDL FEC of Fig 10 is
if
constructed in a way, that all dimensions on the path
through the multidimensional' scalability space are included
in the construction of redundancy symbols, 1 e for a <
particular L-dimensional Constellation {D0, , DL-I) the
source symbols of all Constellations with d < DL , with 0 ^
1 ^ L-l are used for constructing the redundancy symbols
That allows for increasing the probability of
reconstructing a Constellation {do,. , dh-i) on a path
through the multidimensional scalability space, without
increasing the number of redundancy symbols
If, for example, an error occurs in the base layer,
successive constellations beginning with Constellation 000
are tested for correction] If Constellation 000 fails
constellations with two successive layers, as shown in Fig
10 with Constellation 100,, 010, 001 are used and so on
i
A transmission of scalable media streams with MDL FEC may
offer advantages For example, in some scenarios like e g
unequal error protection [A5] or layered multicast [A6], it
is meaningful to transmit layers separately In such a case
MDL FEC increases decoding probability for lower layers of
dimensions Fig 11 depicts an example of two dependent
layers with layered FEC An error burst is shown to occur
in lower layer. ,
i
If the lower layer is affected by a such an error burst,
unaffected higher enhancement layers can additionally be
used for decoding subjacent layers without additional
redundancy symbols
i
The above embodiment can be used with LT-Codes (compare
[A7]; with an encoding and decoding matrix extension, as
depicted on the right-hand side in Fig 12 SSs are source
symbols of the unprotected information signal as output by,
for example, portion generator 26 of Fig 2, and ESs are
the encoding symbols as included, for example, in the
protected information signal,output at output 24 in Fig. 2
Encoding symbols are calculated by XORing all SSs in one
i I
line with 1 in the encoding]matrix of Fig. 12 In Fig 12,
i J <
the matrix at the left-hand side shows a generator matrix
! »
as it would be usable within the scheme shown in Fig 19,
according to which each of the disjoint layer portions
would be FEC protected separately As such, the matrix on
the left-hand side is merely shown for comparison reasons
The generator matrix on the right-hand side shows that
symbols of layers 0 and 1 are combined in order to achieve
the encoding symbols ES for making up the protected
disjoint layer data of layer 1 and that symbols of layers
0, 1 and 2 are combined ini order to achieve the encoding
symbols ES for making up the protected disjoint layer data
of layer 2
In effect, the generator matrix shown in Fig. 12 could be
embodied by the FEC protector 28 shown in Fig 2 wherein
each module 28a to 28d would correspond with any of the
lines of this generator matrix denoted by "layer 0", "layer
1" or "layer n" on the right hand side. In particular,
layer-n module would perform different sums or other
combinations between those km code words within the layer-m
portions, with 0
mn , encoded code words representing both the redundancy
information as well as the payload data of layer-n portion
in a non-systematic way , .
'I
The above embodiments can even be used with non-systematic
and systematic Raptor-Codes (compare [A8]) with encoding
and decoding matrix extension depicted in Fig 12 and
additional precoding matrix' extension depicted in Fig 13
(for systematic encoding), wherein again, in Fig 13, the
matrix at the left-hand si'de shows a possible precoding
matrix as it would be usable within the scheme shown in
Fig 19, according to which each of the disjoint layer
portions would be FEC protected separately, whereas the
left-nand side matrix could be used as when implementing
layered FEC by use of Raptor codes. As a precautionary
measure only it is noted that Fig 13 assumes the nuber of
layers to be 2 whereas in Fig. 12, the number of layers is
3 As can be seen, by the precoding matrix of Fig. 13, the
symbols of a higher layer are precoded by combining them
with lower layer symbols. Carefully setting the combination
part of the precoding matrix (lower left-hand part of the
right-hand matrix in Fig. 13) results in a systematic code
when applying the right-hand matrix of Fig. 12 As can be
seen, only a part Al* of the combination area of Fig 13
matrix has to be set, the,( remaining part may be set to
zero
Further, the above embodiments can be used with LDPC-Codes
(see [A9]) with an extended parity matrix similar to
extended encoding matrix of LT-Code, or with linear block
codes (see, for example [A2]).
The embodiments described above can be combined with
scalable media codecs. The scalable media codecs may be
scalable video and audio codecs, for example, and can be
combined with scalable media codecs that have a one-
dimensional or multi-dimensional dependency structure In
the latter case, the multi-dimensional dependency structure
may be adopted to form the MDL FEC as described above In
general, the above embodiments can be applied for the
protection of any data set including computer graphics,
scene description, meta-data, semantic data, where the
usefulness of one subset of the data depends on the
correctness of another subset of the data.
Before describing embodiments using rateless codes in more
detail, the following section gives a brief overview over
rateless codes with focus on Luby transform code and raptor
code Again, scalable video coding is used as an
illustrative application embodiment The extension of
rateless codes to layered FEC approach will be explained
then along with the presentation of some selected results
Rateless or fountain codes ,-rj rateless codes and fountain
codes are synonyms - are error correction codes mainly used
in environments with packet' losses It can produce a
theoretical infinite number,.n of encoding symbols (ESs)
from a limited number k of b'ource symbols (SSs) with low
f
complexity due to sparse coding matrices. For successful
decoding the number of rece'ived symbols Erec has to be
higher than k + A, where A jgtands for the necessary
decoding overhead, which is around 3% to 5% of original
source symbols k depending 'ojn used FEC technique T
The difficulty in design of jrateless codes lies in de-
veloping an algorithm to pro'duce a theoretical infinite
number of unique sets of XOR combinations P providing a
balance between source symbol coverage and sparse matrix
allocation influencing the value of A on one side and
complexity on the other side
First practical solution of rateless code was proposed 2002
by Michael Luby with the Lu'b'y Transform (LT) code [A7]
First input data is divided in k SSs, each of size t
Generation of encoding symbols is done by computing for
each Ej. a different XOR combination of d source symbols
defined by set Px where the number of included source
symbols d is called degree 'Each set Px is randomly
generated from a suitable degree distribution where i
denotes the unique identification number (ESI) which is
used as the random seed for (the pseudo-random generator
The ESI number is passed tq ,the decoder along with the
encoding symbol Different XOR combination vectors Po,
P„-i build the LT encoding matrix GLT which is depicted in
Fig. 14. (l
i i
Each encoding symbol Ex of matrix row and ESI number I is
generated by xor'ing all source symbols K with a Boolean 1
in combination set Px Complete encoding operation can be
also expressed as: '
j
£[0 n-i] = GL|r|(0,l, . .,n-l) 'K
il (1)
At receiver side XOR combinations Px can be rebuilt with
ESIs irec S {0, , n-1} of successful received encoding
symbols Ex. If XOR combmatibn sets of received encoding
symbols have at minimum k successfully received linear ''
independent XOR combinations' k source symbols can be
recovered by solving resulting system of equations.
i
I
Raptor codes are proposed ljri [B7] They manage to reduce
coding complexity by introducing an additional pre-code so
that the coverage-constraint of source symbols for LT-
Encodmg is softened and a sparser matrix GLT with lower
degree d is possible. Encoding is done in the same way like
LT-Code but using pre-coded' symbols F instead of source
symbols K as scurce for LT-Encoding Symbols F are
calculated with an additional FEC generated by a s j k
generator matrix Gp, where s denotes the number of parity
symbols Dp Parity symbols are computed following equ 2
DP=GP-K
(2)
The resulting encoding symbols E are computed with the pre-
code symbols F = [DPK] as source for generator matrix GLT
following equ 1
In most transmission systems direct access to original data
is beneficial. Therefore in [B8] and [A8] a systematic
version of raptcr code is proposed where source symbols
appear in the encoding symbols. Pre-code generation is
slightly modified To compensate xor'ing of source symbols
in LT-code matrix GLT IS also introduced in precode
generation Figure 15 depicts systematic pre-coding matrix
GpSys
i
The constraint introduced with GLT causes that LT-encodmg
of first k pre-coding symbols FQ, , Fk-i results in original
source symbols K and therefore in a systematic code If Is
stands for an s x s identity matrix pre-coding matrix GpSys
is defined as-
r .
t i
" 1
i|
Precoding symbols Fsys can then computed solving system of
equations built by constraint process depicted in fig. 15.
I
G i'F =\°~
pSys ,f sys „
■' (4)
i }'
The systematic raptor symbols E(0 n-u are computed with the
pre-code symbols Fsys as source for generator matrix GLT
following equ 1.
Based on the above techniques, layered rateless codes can
be constructed in the following way In particular, to
adopt the layered FEC scheme'to systematic raptor codes,
the encoding and pre-coding matrices, GLT and GpSysi have to
be modified for dependency layers 1 > 0 following the
procedure of layered FEC
First extension of LT encoding matrix is shown Standard LT
encoding matrix GLT has dimension k x n To extend xor'ing
area to lower layers and keep code rate constant GLTm has to
be extended for layer m with ki is the number of source
symbols for layer 1 to a \2/1 Apr. 2006
[Bill ETSI TS 102 005 (VI 2 1), Digital Video
Broadcasting (DVB) , Specification for the use of Video
i
and Audio Coding in DVB services delivered directly over
IP Protocols, Apr. 2006 ' :(
[B12] E. N Gilbert, ' "Capacity of a burst-noise
channel," Bell Systems Technical Journal, vol 39, pp
12531265, 1960 ! ,':
i
[B13] M. Hannuksela, V '.jVadakital and S Jumislo-Pyykk,
"Comparison of Error Protection Methods for Audio-Video
Broadcast over DVB-H", EURASIP Journal on Advances in
Signal Processing Volume 2007, Arcticle ID 71801, 12 pages,
2007
WE CLAIM
1 A method for error correcting an information signal being scalable so that
portions (10a, 10b, 10c) thereof represent an information content at different
levels (x00, x ~\of quality, wherein at least a first one (10a) of the plurality
of portions refi \entmg the information content at a first one (x01) of the
different levels higher than a second one (x00) of the different levels at
which a second one (10c) of the plurality of portions represents the
information content, overlaps with the second portion (10c), wherein the
information signal is FEC protected by each of the different levels (x00, x01)
having redundancy information associated therewith such that each
redundancy information is dependent on the respective portion representing
the information content at the respective level, and the redundancy
information associated with the first level (x01) is dependent on the first
portion (10a) including a part thereof overlapping the second portion (10b),
the method comprising
correcting in a corrector (70) an error of the information signal within the
second portion (10b) by use of the redundancy information associated with
the first and second levels (x00, x01) and a part of the first portion (10a)
disjoint to the second portion (10b), and
deriving in a denver (72) the information content at the second level (x00) of
quality from the error corrected second portion with discarding the part of
the first portion (10a)
2 The method as claimed in claim 1, wherein the information signal is scalable
in a plurality of dimensions (12, 14) so that the portions (10a, 10b, 10c)
thereof represent the information content at different constellations (x10,
x11, x00, x01) of levels of the plurality of dimensions,
wherein the first one (10a) of the plurality of portions representing the
information content at a level of a first one of the plurality of dimensions
higher than a level in the first dimension at which the second one of the
plurality of portions represents the information content, overlaps with the
second portion (10c),
wherein at least a third one (10b) of the plurality of portions being different
from the first portion and representing the information content at a level of a
second one of the plurality of dimensions higher than a level in the second
dimensions at which a fourth one of the plurality of portions represents the
information content, overlaps with the fourth portion,
wherein the information signal is FEC protected by each of the different
constellations (x10, x11, x00, x01) having redundancy information
associated therewith such that
each redundancy information is dependent on the respective portion
representing the information content at the respective constellation,
the redundancy information associated with the constellation at which the
first portion represents the information content is dependent on the first
portion (10a) including a part thereof overlapping the second portion, and
the redundancy information associated with the constellation at which the
third portion (10b) represents the information content is dependent on the
third portion including a part thereof overlapping the fourth portion
3 The method as claimed in claim 2, wherein the second portion (10c) is equal
to the fourth portion
4 The method as claimed in claim 2, wherein the second and fourth portions
overlap each other
5 The method as claimed in claim 4, wherein a fifth one of the plurality of
portions representing the information content at the level of the first
dimension at which the first portion represents the information content, and
the level of the second dimension at which the third portion represents the
information content, overlaps with the first and third portions so that the first
and third portions are proper subsets of the fifth portion, and the redundancy
information associated with the constellation at which the fifth portion
represents the information content is dependent on the fifth portion including
a part thereof overlapping the second and fourth portions, a part thereof
overlapping the first portion but being disjoint to the second and fourth
portions, and a part thereof overlapping the third portion but being disjoint to
the second and fourth portions
6 The method as claimed in claim 2, wherein the information signal is
arranged as a data stream of consecutive time frames, wherein within each
time frame, a part of the data stream concerning redundancy information
associated with the constellation at which the first portion represents the
information content succeeds a part of the data stream concerning the
second portion and a part of the data stream concerning redundancy
information associated with the constellation at which the second portion
represents the information content precedes a part of the data stream
concerning a part of the first portion disjoint to the second portion, and a
part of the data stream concerning redundancy information associated with
the constellation at which the third portion represents the information
content succeeds a part of the data stream concerning the fourth portion
and a part of the data stream concerning redundancy information
associated with the constellation at which the fourth portion represents the
information content precedes a part of the data stream concerning a part of
the third portion disjoint to the fourth portion
7 The method as claimed in claim 2, wherein the redundancy information is
based on an LT code, Raptor code, LDPC code or an online code
8 The method as claimed in claim 2, wherein the information content
comprises audio content, video content and/or 3D model content
9 The method as claimed in claim 2, wherein the plurality of dimensions are
selected from the group consisting of temporal sampling resolution, spatial
sampling resolution, view number, audio channel number, stereoscopy/non-
stereoscopy, and sample value bit depth
10 The method as claimed in claim 1, wherein the information signal is scalable
so that portions thereof represent a time instant of the information content at
different levels of quality
11 The method as claimed in claim 1, wherein the information signal represents
a 3D and/or audio information content and is scalable so that portions
thereof represent the information content at different levels of quality
12 A method for encoding an information content into an information signal
being scalable so that portions thereof represent the information content at
different levels of quality, comprising
generating the plurality of portions in a generator so that at least a first one
of the plurality of portions representing the information content at a first one
of the different levels higher than a second one of the different levels at
which a second one of the plurality of portions represents the information ,
content, overlaps with the second portion,
protecting the information signal in a protector for FE,C by associating
redundancy information to each of the different constellations such that
each redundancy information is dependent on the respective portion
representing the information content at the respective level,
wherein the redundancy information associated with the first level at which
the first portion represents the information content is dependent on the first
portion including a part thereof overlapping the second portion
13 The method as claimed in claim 12, wherein the plurality of portion is
generated by the generator such that the second portion is equal to the
fourth portion, and wherein the second portion and fourth portion overlap
each other
14 The method as claimed in claim 13, wherein the plurality of portions as
generated such that a fifth one of the plurality of portions representing the
information content at the level of the first dimension at which the first
portion represents the information content, and the level of the second
dimension at which the third portion represents the information content,
overlaps with the first and third portions so that the first and third portions
are proper subsets of the fifth portion, and the protector for FEC protecting
is configured to FEC protect the information signal such that the redundancy
information associated with the constellation at which the fifth portion
represents the information content is dependent on the fifth portion including
a part thereof overlapping the second and fourth portions, a part thereof
overlapping the first portion but being disjoint to the second and fourth
portions, and a part thereof overlapping the third portion but being disjoint to
the second and fourth portions
15 The method as claimed in claim 12, wherein the information signal is
protected such that the redundancy information is based on an LT code,
Raptor code LDPC code or an online code
16 The method as claimed in claim 12, wherein the information content
comprises audio content, video content and/or 3D model content
17 The method as claimed in claim 12, wherein the plurality of dimensions are
selected from the group consisting of temporal sampling resolution, spatial
sampling resolution, view number, audio channel number, stereoscopy/non-
stereoscopy, and sample value bit depth
18 The method as claimed in claim 12, wherein the portions of the information
signal represent a time instant of the information content at different levels
of quality
19 The method as claimed in claim 12, wherein the information content is 3D
and/or audio information content and the information signal represents the
3D and/or audio information content
ABSTRACT
TITLE : "METHOD FOR ENCODING INFORMATION CONTENT TO AN
INFORMATION SIGNAL AND ERROR CORRECTING THE SIGNAL"
A method for error correcting an information signal being scalable so that
portions (10a, 10b, 10c) thereof represent an information content at different
levels (x00, x01) of quality, wherein at least a first one (10a) of the plurality of
portions representing the information content at a first one (x01) of the different
levels higher than a second one (x00) of the different levels at which a second
one (10c) of the plurality of portions represents the information content, overlaps
with the second portion (10c), wherein the information signal is FEC protected by
each of the different levels (x00, x01) having redundancy information associated
therewith such that each redundancy information is dependent on the respective
portion representing the information content at the respective level, and the
redundancy information associated with the first level (x01) is dependent on the
first portion (10a) including a part thereof overlapping the second portion (10b),
the method comprising correcting in a corrector (70) an error of the information
signal within the second portion (10b) by use of the redundancy information
associated with the first and second levels (x00, x01) and a part of the first
portion (10a) disjoint to the second portion (10b), and deriving in a deriver (72)
the information content at the second level (x00) of quality from the error
corrected second portion with discarding the part of the first portion (10a)