Video encoders encode a sequence of video images (e.g., video frames) by using a variety of encoding schemes. Video encoding schemes typically encode video frames or portions of video frames (e.g., sets of pixels in the video frames) in terms of intraframes or interframes. An intraframe encoded frame or pixel set is one that is encoded independently of other frames or pixels sets in other frames. An interframe encoded frame or pixel set is one that is encoded by reference to one or more other frames or pixel sets in other frames.
When compressing video frames, some encoders implement a ‘rate controller,’ which provides a ‘bit budget’ for a video frame or a set of video frames that are to be encoded. The bit budget specifies the number of bits that have been allocated to encode the video frame or set of video frames. By efficiently allocating the bit budgets, the rate controller attempts to generate the highest quality compressed video stream in view of certain constraints (e.g., a target bit rate, etc.).
To date, a variety of single-pass and multi-pass rate controllers have been proposed. A single-pass rate controller provides bit budgets for an encoding scheme that encodes a series of video images in one pass, whereas a multi-pass rate controller provides bit budgets for an encoding scheme that encodes a series of video images in multiple passes.
Single-pass rate controllers are useful in real-time encoding situations. Multi-pass rate controllers, on the other hand, optimize the encoding for a particular bit rate based on a set of constraints. Not many rate controllers to date consider the spatial or temporal complexity of frames or pixel-sets within the frames in controlling the bit rates of their encodings. Also, most multi-pass rate controllers do not adequately search the solution space for encoding solutions that use optimal quantization parameters for frames and/or pixel sets within frames in view of a desired bit rate.
Therefore, there is a need in the art for a rate controller that uses novel techniques to consider the spatial or temporal complexity of video images and/or portions of video images, while controlling the bit rate for encoding a set of video images. There is also a need in the art for a multi-pass rate controller that adequately examines the encoding solutions to identify an encoding solution that uses an optimal set of quantization parameters for video images and/or portions of video images.
Some embodiments of the invention encode a sequence of video images based on “visual masking” attributes of the video images and/or portions of the video images. Visual masking of an image or a portion of the image is an indication of how much coding artifacts can be tolerated in the image or image portion. To express the visual masking attribute of an image or an image portion, some embodiments compute a visual masking strength that quantifies the brightness energy of the image or the image portion. In some embodiments, the brightness energy is measured as a function of the average luma or pixel energy of the image or image portion.
Instead of, or in conjunction with the brightness energy, the visual masking strength of an image or image portion might also quantify activity energy of the image or image portion. The activity energy expresses the complexity of the image or image portion. In some embodiments, the activity energy includes a spatial component that quantifies the spatial complexity of the image or image portion, and/or a motion component that quantifies the amount of distortion that can be tolerated/masked due to motion between images.
Some embodiments of the invention provide a method for encoding video sequences. The method identifies a visual-masking attribute of a first image in the video. It also identifies a quantization parameter for encoding the first image based on the identified visual-masking attribute. The method then encodes the first image based on the identified quantization parameter.
The novel features of the invention are set forth in the appended claims. However, for purpose of explanation, several embodiments of the invention are set forth in the following figures.
a is a plot of the difference between nominal removal time and final arrival time of images versus image number illustrating an underflow condition in some embodiments.
b illustrates a plot of the difference between nominal removal time and final arrival time of images versus image number for the same images shown in
In the following detailed description of the invention, numerous details, examples and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed.
Some embodiments of the invention provide a method of encoding a sequence of video images based on “visual masking” attributes of the video images and/or portions of the video images. Visual masking of an image or a portion of the image is an indication of how much coding artifacts can be tolerated in the image or image portion. The invention's use of visual masking is based on the realization that coding artifacts (noise) in brighter or complex areas of an image or image portion are less visible than those in darker or flat areas of the image or image portion.
In the discussion below, each video image is a video frame, and each image portion is a macroblock within the video frame. One of ordinary skill will realize that in some embodiments the video images are not frames (e.g., the video images are fields, etc.) and the image portions are not macroblocks (e.g., the image portions are partitions of macroblocks, etc.).
To express the visual masking attribute of a frame or a macroblock, some embodiments compute a visual masking strength that quantifies the brightness energy of the frame or the macroblock. In some embodiments, the brightness energy is measured as a function of the average luma or pixel energy of the frame or macroblock.
Instead of, or in conjunction with the brightness energy, the visual masking strength of a frame or macroblock might also quantify activity energy of the frame or macroblock. The activity energy expresses the complexity of the frame or macroblock. In some embodiments, the activity energy includes a spatial component and/or a motion component. In some embodiments, the spatial activity energy is calculated as a function of the differences in the pixel values of the frame or macroblock. The more pixel values differ from each other in the frame or macroblock, the more spatial energy the frame or macroblock has.
In some embodiments, the motion activity component (also called temporal activity) quantifies the amount of distortion that can be tolerated/masked due to motion between frames. In some embodiments, this motion activity component is calculated as a function of the motion compensated error signal of pixel regions defined within the frame. In other embodiments, this motion activity is calculated as a function of the motion compensated error signal of pixel regions defined within the current frame, a set of frames before the current frame, and/or a set of frames after the current frame.
I. Definitions
This section provides definitions for several symbols that are used in this document.
RT represents a target bit rate, which is a desired bit rate for encoding a sequence of frames. Typically, this bit rate is expressed in units of bit/second, and is calculated from the desired final file size, the number of frames in the sequence, and the frame rate.
Rp represents the bit rate of the encoded bit stream at the end of a pass p.
Ep represents the percentage of error in the bit rate at the end of pass p. In some cases, this percentage is calculated as
ε represents the error tolerance in the final bit rate.
εC represents the error tolerance in the bit rate for the first QP search stage.
QP represents the quantization parameter.
QPNom(p) represents the nominal quantization parameter that is used in pass p encoding for a sequence of frames. The value of QPNom(p) is adjusted by the invention's multi-pass encoder in a first QP adjustment stage to reach the target bit rate.
MQPp(k) represents the masked frame QP, which is the quantization parameter (QP) for a frame k in pass p. Some embodiments compute this value by using the nominal QP and frame-level visual masking.
MQPMB(p)(k, m) represents the masked macroblock QP, which is the quantization parameter (QP) for an individual macroblock (with a macroblock index m) in a frame k and a pass p. Some embodiments compute MQPMB(p)(k, m) by using MQPp(k) and macroblock-level visual masking.
φF(k) represents a value referred to as the masking strength for frame k. The masking strength φF(k) is a measure of complexity for the frame and, in some embodiments, this value is used to determine how visible coding artifacts/noise would appear and to compute the MQPp(k) of frame k.
φR(p) represents the reference masking strength in pass p. The reference masking strength is used to compute MQPp(k) of frame k, and it is adjusted by the invention's multi-pass encoder in a second stage to reach the target bit rate.
φMB(k, m) represents the masking strength for a macroblock with an index m in frame k. The masking strength φMB(k, m) is a measure of complexity for the macroblock and, in some embodiments, it is used to determine how visible coding artifacts/noise would appear and to compute MQPMB(p)(k, m). AMQPp represents an average masked QP over frames in pass p. In some embodiments, this value is computed as the average MQPp(k) over all frames in a pass p.
II. Overview
Some embodiments of the invention provide an encoding method that achieves the best visual quality for encoding a sequence of frames at a given bit rate. In some embodiments, this method uses a visual masking process that assigns a quantization parameter QP to every macroblock. This assignment is based on the realization that coding artifacts/noise in brighter or spatially complex areas in an image or a video frame are less visible than those in darker or flat areas.
In some embodiments, this visual masking process is performed as part of an inventive multi-pass encoding process. This encoding process adjusts a nominal quantization parameter and controls the visual masking process through a reference masking strength parameter φR, in order to have the final encoded bit stream reach the target bit rate. As further described below, adjusting the nominal quantization parameter and controlling the masking algorithm adjust the QP values for each picture (i.e., each frame in typically video encoding schemes) and each macroblock within each picture.
In some embodiments, the multi-pass encoding process globally adjusts the nominal QP and φR for the entire sequence. In other embodiments, this process divides the video sequence into segments, with the nominal QP and φR adjusted for each segment. The description below refers to a sequence of frames on which the multi-pass encoding process is employed. One of ordinary skill will realize that this sequence includes the entire sequence in some embodiments, while it includes only a segment of a sequence in other embodiments.
In some embodiments, the method has three stages of encoding. These three stages are: (1) an initial analysis stage that is performed in pass 0, (2) a first search stage that is performed in pass 1 through pass N1, and (3) a second search stage that is performed in pass N1+1 through N1+N2.
In the initial analysis stage (i.e., during pass 0), the method identifies an initial value for the nominal QP (QPNom(1), to be used in pass 1 of the encoding). During the initial analysis stage, the method also identifies a value of the reference masking strength φR, which is used in all the passes in first search stage.
In first search stage, the method performs N1 iterations (i.e., N1 passes) of an encoding process. For each frame k during each pass p, the process encodes the frame by using a particular quantization parameter MQPp(k) and particular quantization parameters MQPMB(p)(k, m) for individual macroblocks m within the frame k, where MQPMB(p)(k, m) is computed using MQPp(k).
In the first search stage, the quantization parameter MQPp(k) changes between passes as it is derived from a nominal quantization parameter. QPNom(p) that changes between passes. In other words, at the end of each pass p during the first search stage, the process computes a nominal QPNom(p+1) for pass p+1. In some embodiments, the nominal QPNom(p+1) is based on the nominal QP value(s) and bit rate error(s) from previous pass(es). In other embodiments, the nominal QPNom(p+1) value is computed differently at the end of each pass in the second search stage.
In the second search stage, the method performs N2 iterations (i.e., N2 passes) of the encoding process. As in the first search stage, the process encodes each frame k during each pass p by using a particular quantization parameter MQPp(k) and particular quantization parameters MQPMB(p)(k, m) for individual macroblocks m within the frame k, where MQPMB(p)(k, m) is derived from MQPp(k).
Also, as in the first search stage, the quantization parameter MQPp(k) changes between passes. However, during the second search stage, this parameter changes as it is computed using a reference masking strength φR(p) that changes between passes. In some embodiments, the reference masking strength φR(p) is computed based on the error in bit rate(s) and value(s) of φR from previous pass(es). In other embodiments, this reference masking strength is computed to be a different value at the end of each pass in the second search stage.
Although the multi-pass encoding process is described in conjunction with the visual masking process, one of ordinary skill in art will realize that an encoder does not need to use both these processes together. For instance, in some embodiments, the multi-pass encoding process is used to encode a bitstream near a given target bit rate without visual masking, by ignoring φR and omitting the second search stage described above.
The visual masking and multi-pass encoding process are further described in Sections III and IV of this application.
III. Visual Masking
Given a nominal quantization parameter, the visual masking process first computes a masked frame quantization parameter (MQP) for each frame using the reference masking strength (φR) and the frame masking strength (φF). This process then computes a masked macroblock quantization parameter (MQPMB) for each macroblock, based on the frame and macroblock-level masking strengths (φF and φMB). When the visual masking process is employed in a multi-pass encoding process, the reference masking strength (φR) in some embodiments is identified during the first encoding pass, as mentioned above and further described below.
A. Computing the Frame-Level Masking Strength
1. First Approach
To compute the frame-level masking strength φF(k), some embodiments use the following equation (A):
φF(k)=C*power(E*avgFrameLuma(k),β)*power(D*avgFrameSAD(k),αF), (A)
where
The pseudo-code for the function Calc4×4MeanRemovedSAD is as follows:
2. Second Approach
Other embodiments compute the frame-level masking strength differently. For instance, the above-described equation (A) computes the frame masking strength essentially as follows:
φF*(k)=C*power(E*Brightness_Attribute,exponent0)* power(scalar*Spatial_Activity_Attribute,exponent1).
In equation (A), the frame's Brightness_Attribute equals avgFrameLuma(k), and the Spatial_Activity_Attribute equals avgFrameSAD(k), which is the average macroblock SAD (MbSAD(k, m)) value over all macroblocks in a frame, where the average macroblock SAD equals the sum of the absolute value of the mean removed 4×4 pixel variation (as given by Calc4×4MeanRemovedSAD) for all 4×4 blocks in a macroblock. This Spatial_Activity_Attribute measures the amount of spatial innovations in a region of pixels within the frame that is being coded.
Other embodiments expand the activity measure to include the amount of temporal innovations in a region of pixels across a number of successive frames. Specifically, these embodiments compute. The frame masking strength as follows:
φF(k)=C*power(E*Brightness_Attribute,exponent0)*power(scalar*Activity_Attribute, exponent1) (B)
In this equation, the Activity_Attribute is given by the following equation (C),
Activity_Attribute=G*power(D*Spatial_Activity_Attribute,exponent_beta)+E*power(F*Temporal_Activity_Attribute,exponent_delta) (C)
In some embodiments, the Temporal_Activity_Attribute quantifies the amount of distortion that can be tolerated (i.e., masked) due to motion between frames. In some of these embodiments, the Temporal_Activity_Attribute of a frame equals a constant times the sum of the absolute value of the motion compensated error signal of pixel regions defined within the frame. In other embodiments, Temporal_Activity_Attribute is provided by the equation (D) below:
In equation (D), “avgFrameSAD” expresses (as described above) the average macroblock SAD (MbSAD(k, m)) value in a frame, avgFrameSAD(0) is the avgFrameSAD for the current frame, and negative j indexes time instances before the current and positive j indexes time instances after the current frame. Hence, avgFrameSAD(j=−2) expresses the average frame SAD of two frames before the current frame, avgFrameSAD(j=3) expresses the average frame SAD of three frames after the current frame.
Also, in equation (D), the variables N and M refer to the number of frames that are respectively before and after the current frame. Instead of simply selecting the values N and M based on particular number of frames, some embodiments compute the values N and M based on the particular durations of time before and after the time of the current frame. Correlating the motion masking to temporal durations is more advantageous than correlating the motion masking to a set number of frames. This is because the correlation of the motion masking with the temporal durations is directly in line with the viewer's time-based visual perception. The correlation of such masking with the number of frames, on the other hand, suffers from a variable display duration as different displays present video at different frame rates.
In equation (D), “W” refers to a weighting factor, which, in some embodiment, decreases as the frame j gets further from the current frame. Also, in this equation, the first summation expresses the amount of motion that can be masked before the current frame, the second summation expresses the amount of motion that can be masked after the current frame, and the last expression (avgFrameSAD(0)) expresses the frame SAD of the current frame.
In some embodiments, the weighting factors are adjusted to account for scene changes. For instance, some embodiments account for an upcoming scene change within the look ahead range (i.e., within the M frames) but not any frames after a scene change. For instance, these embodiments might set the weighting factors to zero for frame's within the look ahead range that are after a scene change. Also, some embodiments do not account for frames prior to or on a scene change within the look behind range (i.e., within the N frames). For instance, these embodiments might set the weighting factors to zero for frames within the look behind range that relate to a previous scene or fall before the previous scene change.
3. Variations to the Second Approach
a) Limiting the Influence of Past and Future Frames on the Temporal_Activity_Attribute
Equation (D) above essentially expresses the Temporal_Activity_Attribute in the following terms:
where Past_Frame_Activity (PFA) equals
Future_Frame_Activity (FFA) equals
and Current_Frame_Activity (CFA) equals avgFrameSAD(current).
Some embodiments modify the calculation of the Temporal_Activity_Attribute so that neither the Past_Frame Activity nor the Future_Frame_Activity unduly controls the value of the Temporal_Activity_Attribute. For instance, some embodiments initially define PFA to equal and FFA to equal
and FFA to equal
These embodiments then determine whether PFA is bigger than a scalar times FFA. If so, these embodiments then set PFA equal to an upper PFA limit value (e.g., a scalar times FFA). In addition to setting PFA equal to an upper PFA limit value, some embodiments may perform a combination of setting FFA to zero and setting CFA to zero. Other embodiments might set either of or both of PFA and CFA to a weighted combination of PFA, CFA, and FFA.
Analogously, after initially defining the PFA and FFA values based on the weighted sums, some embodiments also determine whether FFA value is bigger than a scalar times PFA. If so, these embodiments then set FFA equal to an upper FFA limit value (e.g., a scalar times PFA). In addition to setting FFA equal to an upper FFA limit value, some embodiments may perform a combination of setting PFA to zero and setting CFA to zero. Other embodiments may set either of or both of FFA and CFA to a weighted combination of FFA, CFA, and PFA.
The potential subsequent adjustment of the PFA and FFA values (after the initial computation of these values based on the weighted sums) prevent either of these values from unduly controlling the Temporal_Activity_Attribute.
b) Limiting the Influence of Spatial_Activity_Attribute and Temporal_Activity_Attribute on the Activity_Attribute
Equation (C) above essentially expresses the Activity_Attribute in the following terms:
Activity_Attribute=Spatial_Activity+Temporal_Activity,
where the Spatial_Activity equals a scalar*(scalar*Spatial_Activity_Attribute)β, and Temporal_Activity equals a scalar*(scalar*Temporal_Activity_Attribute)Δ.
Some embodiments modify the calculation of the Activity_Attribute so that neither the Spatial_Activity nor the Temporal_Activity unduly controls the value of the Activity_Attribute. For instance, some embodiments initially define the Spatial_Activity (SA) to equal a scalar*(scalar*Spatial_Activity_Attribute)β, and define the Temporal_Activity (TA) to equal a scalar*(scalar*Temporal_Activity_Attribute)Δ.
These embodiments then determine whether SA is bigger than a scalar times TA. If so, these embodiments then set SA equal to an upper SA limit value (e.g., a scalar times TA). In addition to setting SA equal to an upper SA limit in such a case, some embodiments might also set the TA value to zero or to a weighted combination of TA and SA.
Analogously, after initially defining the SA and TA values based on the exponential equations, some embodiments also determine whether TA value is bigger than a scalar times SA. If so, these embodiments then set TA equal to an upper TA limit value (e.g., a scalar times SA). In addition to setting TA equal to an upper TA limit in such a case, some embodiments might also set the SA value to zero or to a weighted combination of SA and TA.
The potential subsequent adjustment of the SA and TA values (after the initial computation of these values based on the exponential equations) prevent either of these values from unduly controlling the Activity_Attribute.
B. Computing the Macroblock-Level Masking Strength
1. First Approach
In some embodiments, the macroblock-level masking strength φMB(k, m) is calculated as follows:
φMB(k,m)=A*power(C*avgMbLuma(k,m),β)*power(B*MbSAD(k, m),αMB), (F)
where
2. Second Approach
The above-described equation (F) computes the macroblock masking strength essentially as follows:
φMB(k,m)=D*power(E*Mb_Brightness_Attribute,exponent0)* power(scalar*Mb_Spatial_Activity_Attribute,exponent1).
In equation (F), the macroblock's Mb_Brightness_Attribute equals avgMbLuma(k,m), and Mb_Spatial_Activity_Attribute equals avgMbSAD(k). This Mb_Spatial_Activity_Attribute measures the amount of spatial innovations in a region of pixels within the macroblock that is being coded.
Just as in the case of the frame masking strength, some embodiments might expand the activity measure in the macroblock masking strength to include the amount of temporal innovations in a region of pixels across a number of successive frames. Specifically, these embodiments would compute the macroblock masking strength as follows:
φMB(k,m)=D*power(E*Mb_Brightness_Attribute,exponent0)* power(scalar*Mb_Activity_Attribute,exponent1), (G)
where the Mb_Activity_Attribute is given by the following equation (H),
Mb_Activity_Attribute=F*power(D*Mb_Spatial_Activity_Attribute,exponent_beta)+G*power(F*Mb_Temporal_Activity_Attribute,exponent_delta) (H)
The computation of the Mb_Temporal_Activity_Attribute for a macroblock can be analogous to the above-described computation of the Mb Temporal_Activity_Attribute for a frame. For instance, in some of these embodiments, the Mb_Temporal_Activity_Attribute is provided by the equation (I) below:
The variables in the equation (I) were defined in Section III.A. In equation (F), the macroblock m in frame i or j can be the macroblock in the same location as the macroblock m in the current frame, or can be the macroblock in frame i or j that is initially predicted to correspond the macroblock m in the current frame.
The Mb Temporal_Activity_Attribute provided by equation (I) can be modified in an analogous manner to the modifications (discussed in Section III.A.3 above) of the frame Temporal_Activity_Attribute provided by equation (D). Specifically, the Mb_Temporal_Activity_Attribute provided by the equation (I) can be modified to limit the undue influence of macroblocks in the past and future frames.
Similarly, the Mb_Activity_Attribute provided by equation (H) can be modified in an analogous manner to the modifications (discussed in Section III.A.3 above) of the frame Activity_Attribute provided by equation (C). Specifically, the Mb_Activity_Attribute provided by equation (H) can be modified to limit the undue influence of the Mb_Spatial_Activity_Attribute and the Mb_Temporal_Activity_Attribute.
C. Computing the Masked QP Values
Based on the values of masking strengths (φF and φMB) and the value of the reference masking strength (φR), the visual masking process can calculate the masked QP values at the frame level and macroblock level by using two functions CalcMQP and CalcMQPforMB. The pseudo code for these two functions is below:
In the above functions, βF and βMB can be predetermined constants or adapted to local statistics.
IV. Multi-Pass Encoding
A. Analysis and initial QP selection
As shown in
At the beginning of pass 0, φR(0) can be some arbitrary value or a value selected based on experimental results (for instance, the middle value of a typical range of φR values). During an analysis of the sequence, a masking strength φF(k) is computed for each frame, then the reference masking strength, φR(1), is set to be equal to avg(φF(k)) at the end of pass 0. Other decisions for the reference masking strength φR are also possible. For instance, it may be computed as the median or other arithmetic function of the values φF(k), e.g., a weighted average of the values φF(k).
There are several approaches to initial QP selection with varying complexity. For instance, the initial nominal QP can be selected as an arbitrary value (e.g., 26). Alternatively, a value can be selected that is known to produce an acceptable quality for the target bit rate based on coding experiments.
The initial nominal QP value can also be selected from a look-up table based on spatial resolution, frame rate, spatial/temporal complexity, and target bit rate. In some embodiments, this initial nominal QP value is selected from the table using a distance measure that depends on each of these parameters, or it may be selected using a weighted distance measure of these parameters.
This initial nominal QP value can also be set to the adjusted average of the frame QP values as they are selected during a fast encoding with a rate controller (without masking), where the average has been adjusted based on the bit rate percentage rate error E0 for pass 0. Similarly, the initial nominal QP can also be set to a weighted adjusted average of the frame QP values, where the weight for each frame is determined by the percentage of macroblocks in this frame that are not coded as skipped macroblocks. Alternatively, the initial nominal QP can be set to an adjusted average or an adjusted weighted average of the frame QP values as they are selected during a fast encoding with a rate controller (with masking), as long as the effect of changing the reference masking strength from φR(0) to φR(1) is taken into account.
B. First Search Stage: Nominal QP Adjustments
After 105, the multi-pass encoding process 100 enters the first search stage. In first search stage, the process 100 performs N1 encodings of the sequence, where N1 represents the number of passes through the first search stage. During each pass of the first stage, the process uses a changing nominal quantization parameter with a constant reference masking strength.
Specifically, during each pass p in the first search stage, the process 100 computes (at 107) a particular quantization parameter MQPp(k) for each frame k and a particular quantization parameter MQPMB(p)(k, m) for each individual macroblock m within the frame k. The calculation of the parameters MQPp(k) and MQPMB(p)(k, m) for a given nominal quantization parameter QPNom(p) and reference masking strength φR(p) was described in Section III. In the first pass (i.e., pass 1) through 107, the nominal quantization parameter and the first-stage reference masking strength are parameter QPNom(1) and reference masking strength φR(1), which were computed during the initial analysis stage 105.
After 107, the process encodes (at 110) the sequence based on the quantization parameter values computed at 107. Next, the encoding process 100 determines (at 115) whether it should terminate. Different embodiments have different criteria for terminating the overall encoding process. Examples of exit conditions that completely terminate the multi-pass encoding process include:
When the multi-pass encoding process decides (at 115) to terminate, the process 100 omits the second search stage and transitions to 145. At 145, the process saves the bitstream from the last pass p as the final result, and then terminates.
On the other hand, when the process determines (at 115) that it should not terminate, it then determines (at 120) whether it should terminate the first search stage. Again, different embodiments have different criteria for terminating the first search stage. Examples of exit conditions that terminate the first search stage of the multi-pass encoding process include:
When the multi-pass encoding process decides (at 120) to terminate the first search stage, the process 100 proceeds to the second search stage, which is described in the next sub-section. On the other hand, when the process determines (at 120) that it should not terminate the first search stage, it updates (at 125) the nominal QP for the next pass in the first search stage (i.e., defines QPNom(p+1). In some embodiments, the nominal QPNom(p+1) is updated as follows. At the end of pass 1, these embodiments define
QPNom(p+1)=QPNom(p)+χEp,
where χ is a constant. At the end of each pass from pass 2 to pass N1, these embodiments then define
QPNom(p+1)=InterpExtrap(0,Eq1,Eq2,QPNom(q1),QPNom(q2)),
where InterpExtrap is a function that is further described below. Also, in the above equation, q1 and q2 are pass numbers with corresponding bit rate errors that are the lowest among all passes up to pass p, and q1, q2, and p have the following relationship:
1≦q1<q2≦p.
Below is the pseudo code for the InterpExtrap function. Note that if x is not between x1 and x2, this function is an extrapolation function. Otherwise, it is an interpolation function.
The nominal QP value is typically rounded to an integer value and clipped to lie within the valid range of QP values. One of ordinary skill in art will realize that other embodiments might compute the nominal QPNom(p+1) value differently than the approached described above.
After 125, the process transitions back to 107 to start the next pass (i.e., p:=p+1), and for this pass, compute (at 107) a particular quantization parameter MQPp(k) for each frame k and a particular quantization parameter MQPMB(p)(k, m) for each individual macroblock m within the frame k for the current pass p. Next, the process encodes (at 110) the sequence of frames based on these newly computed quantization parameters. From 110, the process then transitions to 115, which was described above.
C. Second Search Stage: Reference Masking Strength Adjustments
When the process 100 determines (at 120) that it should terminate the first search stage, it transitions to 130. In the second search stage, the process 100 performs N2 encodings of the sequence, where N2 represents the number of passes through the second search stage. During each pass, the process uses the same nominal quantization parameter and a changing reference masking strength.
At 130, the process 100 computes a reference masking strength φR(p+1) for the next pass, i.e., pass p+1, which is pass N1+1. In pass N1+1, the process 100 encodes the sequence of frames in 135. Different embodiments compute (at 130) the reference masking strength φR(p+1) at the end of a pass p in different ways. Two alternative approaches are described below.
Some embodiments compute the reference masking strength φR(p) based on the error in bit rate(s) and value(s) of φR from previous pass(es). For instance, at the end of pass N1, some embodiments define
φR(N1+1)=φR(N1)+φR(N1)×Konst×EN1.
At the end of pass N1+m, where m is an integer greater than 1, some embodiments define
φR(N1+m)=InterpExtrap(0,EN1+m−2,EN1+m−1,φR(N1+m−2),φR(N1+m−1)).
Alternatively, some embodiments define
φR(N1+m)=InterpExtrap(0,EN1+m−q2,EN1+m−q1,φR(N1+m−q2),φR(N1+m−q1)),
where q1 and q2 are previous passes that gave the best errors.
Other embodiments compute the reference masking strength at the end of each pass in the second search stage by using AMQP, which was defined in Section I. One way for computing AMQP for a given nominal QP and some value for φR will be described below by reference to the pseudo code of a function GetAvgMaskedQP.
Some embodiments that use AMQP, compute a desired AMQP for pass p+1 based on the error in bit rate(s) and value(s) of AMQP from previous pass(es). The φR(p+1) corresponding to this AMQP is then found through a search procedure given by a function Search(AMQP(p+1), φR(p)), the pseudo code of which is given at the end of this subsection.
These embodiments then define:
φR(N1+1)=Search(AMQPN1+1,φR(N1))
At the end of pass N1+m (where m is an integer greater than 1), some embodiments define:
AMQPN1+m)=InterpExtrap(0,EN1+m−2,EN1+m−1,AMQPN1+m−2,AMQPN1+m−1)),and
φR(N1+m)=Search(AMQPN1+m,φR(N1+m−1))
Given the desired AMQP and some default value of φR, the φR corresponding to the desired AMQP can be found using the Search function, which has the following pseudo code in some embodiments:
In the above pseudo code, the numbers 10, 12 and 0.05 may be replaced with suitably chosen thresholds.
After computing the reference masking strength for the next pass (pass p+1) through the encoding of the frame sequence, the process 100 transitions to 132 and starts the next pass (i.e., p:=p+1). For each frame k and each macroblock m during each encoding pass p, the process computes (at 132) a particular quantization parameter MQPp(k) for each frame k and particular quantization parameters MQPMB(p)(k, m) for individual macroblocks m within the frame k. The calculation of the parameters MQPp(k) and MQPMB(p)(k, m) for a given nominal quantization parameter QPNom(p) and reference masking strength φR(p), were described in Section III. During the first pass through 132, the reference masking strength is the one that was just computed at 130. Also, during the second search stage, the nominal QP remains constant throughout the second search stage. In some embodiments, the nominal QP through the second search stage is the nominal QP that resulted in the best encoding solution (i.e., in the encoding solution with the lowest bit rate error) during the first search stage.
After 132, the process encodes (at 135) the frame sequence using the quantization parameters computed at 130. After 135, the process determines (at 140) whether it should terminate the second search stage. Different embodiments use different criteria for terminating the second search stage at the end of a pass p. Examples of such criteria are:
When the process 100 determines (at 140) that it should not terminate the second search stage, it returns to 130 to recompute the reference masking strength for the next pass of encoding. From 130, the process transitions to 132 to compute quantization parameters and then to 135 to encode the video sequence by using the newly computed quantization parameters.
On the other hand, when the process decides (at 140) to terminate the second search stage, it transitions to 145. At 145, the process 100 saves the bitstream from the last pass p as the final result, and then terminates.
V. Decoder Input Buffer Underflow Control
Some embodiments of the invention provide a multi-pass encoding process that examines various encodings of a video sequence for a target bit rate, in order to identify an optimal encoding solution with respect to the usage of an input buffer used by the decoder. In some embodiment, this multi-pass process follows the multi-pass encoding process 100 of
The decoder input buffer (“decoder buffer”) usage will fluctuate to some degree during the decoding of an encoded sequence of images (e.g., frames), because of a variety of factors, such as fluctuation in the size of encoded images, the speed with which the decoder receives encoded data, the size of the decoder buffer, the speed of the decoding process, etc.
A decoder buffer underflow signifies the situation where the decoder is ready to decode the next image before that image has completely arrived at the decoder side. The multi-pass encoder of some embodiments simulates the decoder buffer and re-encode selected segments in the sequence to prevent decoder buffer underflow.
Specifically, the decoder 205 has an input buffer 215, a decoding process 220, and an output buffer 225. The encoder 210 simulates these modules by maintaining a simulated decoder input buffer 230, a simulated decoding process 235, and a simulated decoder output buffer 240. In order not to obstruct the description of the invention,
The decoder maintains the input buffer 215 to smooth out variations in the rate and arrival time of incoming encoded images. If the decoder runs out of data (underflow) or fills up the input buffer (overflow), there will be visible decoding discontinuities as the picture decoding halts or incoming data is discarded. Both of these cases are undesirable.
To eliminate the underflow condition, the encoder 210 in some embodiments first encodes a sequence of images and stores them in a storage 255. For instance, the encoder 210 uses the multi-pass encoding process 100 to obtain a first encoding of the sequence of images. It then simulates the decoder input buffer 215 and re-encodes the images that would cause buffer underflow. After all buffer underflow conditions are removed, the re-encoded images are supplied to the decoder 205 through a connection 255, which maybe a network connection (Internet, cable, PSTN lines, etc.), a non-network direct connection, a media (DVD, etc.), etc.
After 302, the encoding process 300 simulates (at 305) the decoder input buffer 215 by considering a variety of factors, such as the connection speed (i.e., the speed with which the decoder receives encoded data), the size of the decoder input buffer, the size of encoded images, the decoding process speed, etc. At 310, the process 300 determines if any segment of the encoded images will cause a decoder input buffer to underflow. The techniques that the encoder uses to determine (and subsequently eliminate) the underflow condition are described further below.
If the process 300 determines (at 310) that the encoded images do not create underflow condition, the process ends. On the other hand, if the process 300 determines (at 310) that a buffer underflow condition exists in any segment of the encoded images, it refines (at 315) the encoding parameters based on the value of these parameters from previous encoding passes. The process then re-encodes (at 320) the segment with underflow to reduce the segment bit size. After re-encoding the segment, the process 300 examines (at 325) the segment to determine if the underflow condition is eliminated.
When the process determines (at 325) that the segment still causes underflow, the process 300 transitions to 315 to further refine the encoding parameters to eliminate underflow. Alternatively, when the process determines (at 325) that the segment will not cause any underflow, the process specifies (at 330) that starting point for re-examining and re-encoding the video sequence as the frame after the end of the segment re-encoded in the last iteration at 320. Next, at 335, the process re-encodes the portion of the video sequence specified at 330, up to (and excluding) the first IDR frame following the underflow segment specified at 315 and 320. After 335, the process transitions back to 305 to simulate the decoder buffer to determine whether the rest of the video sequence still causes buffer underflow after re-encoding. The flow of the process 300 from 305 was described above.
A. Determining the Underflow Segment in the Sequence of Encoded Images
As described above, the encoder simulates the decoder buffer conditions to determine whether any segment in the sequence of the encoded or re-encoded images cause underflow in the decoder buffer. In some embodiments, the encoder uses a simulation model that considers the size of encoded images, network conditions such as bandwidth, decoder factors (e.g., input buffer size, initial and nominal time to remove images, decoding process time, display time of each image, etc.).
In some embodiments, the MPEG-4 AVC Coded Picture Buffer (CPB) model is used to simulate the decoder input buffer conditions. The CPB is the term used in MPEG-4H.264 standard to refer to the simulated input buffer of the Hypothetical Reference Decoder (HRD). The HRD is a hypothetical decoder model that specifies constraints on the variability of conforming streams that an encoding process may produce. The CPB model is well known and is described in Section 1 below for convenience. More detailed description of CPB and HRD can be found in Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264/ISO/IEC 14496-10 AVC).
1. Using the CPB Model to Simulate the Decoder Buffer
The following paragraphs describe how the decoder input buffer is simulated in some embodiments using the CPB model. The time at which the first bit of image n begins to enter the CPB is referred to as the initial arrival time tai(n), which is derived as follows:
The final arrival time for image n is derived by
taf(n)=tai(n)+b(n)/BitRate,
where b(n) is the size in bits of image n.
In some embodiments, the encoder makes its own calculations of the nominal removal time as described below instead of reading them from an optional part of the bit stream as in the H.264 specification. For image 0, the nominal removal time of the image from the CPB is specified by
tr,n(0)=initial_cpb_removal_delay
For image n (n>0), the nominal removal time of the image from the CPB is specified by
tr,n(n)=tr,n(0)+sumi=0 to n−1(ti),
where tr,n(n) is the nominal removal time of image n, and ti is the display duration for picture i.
The removal time of image n is specified as follows.
It is this latter case that indicates that the size of image n, b(n), is so large that it prevents removal at the nominal removal time.
2. Detection of Underflow Segments
As described in the previous section, the encoder can simulate the decoder input buffer state and obtain the number of bits in the buffer at a given time instant. Alternatively, the encoder can track how each individual image changes the decoder input buffer state via the difference between its nominal removal time and final arrival time (i.e., tb(n)=tr,n(n)−taf(n)). When tb(n) is less than 0, the buffer is suffering from underflow between time instants tr,n(n) and taf(n), and possibly before tr,n(n) and after taf(n).
The images directly involved in an underflow can be easily found by testing whether tb(n) is less than 0. However, the images with tb(n) less than 0 do not necessarily cause an underflow, and conversely the images causing an underflow might not have tb(n) less than 0. Some embodiments define an underflow segment as a stretch of consecutive images (in decoding order) that cause underflow by continuously depleting the decoder input buffer until underflow reaches its worst point.
At 510, the process 500 compares the final arrival time of each image at the decoder input buffer with the nominal removal time of that image by the decoder. If the process determines that there are no images with final arrival time after the nominal removal time (i.e., no underflow condition exits), the process exits. On the other hand, when an image is found for which the final arrival time is after the nominal removal time, the process determines that there is an underflow and transitions to 515 to identify the underflow segment.
At 515, the process 500 identifies the underflow segment as the segment of the images where the decoder buffer starts to be continuously depleted until the next global minimum where the underflow condition starts to improve (i.e., tb(n) does not get more negative over a stretch of images). The process 500 then exits. In some embodiments, the beginning of the underflow segment is further adjusted to start with an I-frame, which is an intra-encoded image that marks the starting of a set of related inter-encoded images. Once one or more segments that are causing the underflow are identified, the encoder proceeds to eliminate the underflow. Section B below describes elimination of underflow in a single-segment case (i.e., when the entire sequence of encoded images only contains a single underflow segment). Section C then describes elimination of underflow for the multi-segment underflow cases.
B. Single-Segment Underflow Elimination
Referring to
Next, at 610, the process 600 uses the average masked frame QP (AMQP) and total number of bits in the current segment from the last encoding pass (or passes) to estimate a desired AMQP for achieving a desired number of bits for the segment, BT=B −ΔBp, where p is the current number of iterations of the process 600 for the segment. If this iteration is the first iteration of process 600 for the particular segment, AMQP and total number of bits are the AMQP and the total number of bits for this segment that are derived from the initial encoding solution identified at 302. On the other hand, when this iteration is not the first iteration of process 600, these parameters can be derived from the encoding solution or solutions obtained in the last pass or last several passes of the process 600.
Next, at 615, the process 600 uses the desired AMQP to modify average masked frame QP, MQP(n), based on masking strength φF(n) such that images that can tolerate more masking get more bit reductions. The process then re-encodes (at 620) the video segment based on the parameters defined at 315. The process then examines (at 625) the segment to determine whether the underflow condition is eliminated.
C. Underflow Elimination with Multiple Underflow Segments
When there are multiple underflow segments in a sequence, re-encoding of a segment changes the buffer fullness time, tb(n), for all the ensuing frames. To account for the modified buffer condition, the encoder searches for one underflow segment at a time, starting from the first zero-crossing point (i.e., at the lowest n) with a descending slope.
The underflow segment begins at the nearest local maximum preceding this zero-crossing point, and ends at the next global minimum between the zero-crossing point and the next zero-crossing point (or the end of the sequence if there is no more zero crossing). After finding one segment, the encoder hypothetically removes the underflow in this segment and estimates the updated buffer fullness by setting tb(n) to 0 at the end of the segment and redoing the buffer simulation for all subsequent frames.
The encoder then continues searching for the next segment using the modified buffer fullness. Once all underflow segments are identified as described above, the encoder derives the AMQPs and modifies the Masked frame QPs for each segment independently of the others just as in the single-segment case.
One of ordinary skill would realize that other embodiments might be implemented differently. For instance, some embodiments would not identify multiple segments that cause underflow of the input buffer of the decoder. Instead, some embodiments would perform buffer simulation as described above to identify a first segment that causes underflow. After identifying such a segment, these embodiments correct the segment to rectify underflow condition in that segment and then resume encoding following the corrected portion. After the encoding of the remainder of the sequence, these embodiments will repeat this process for the next underflow segment.
D. Applications of Buffer Underflow Management
The decoder buffer underflow techniques described above applies to numerous encoding and decoding systems. Several examples of such systems are described below.
The streaming video server may decide to stream the encoded video images using the slowest bandwidth in the network (i.e., 300 Kb/sec) and the smallest client buffer size. In this case, the streaming server 710 needs only one set of encoded images that are optimized for a target bit rate of 300 Kb/sec. On the other hand, the server may generate and store different encodings that are optimized for different bandwidths and different client buffer conditions.
The output of the player 805 is sent to display devices such as TV 830 or computer display terminal 835. The HD-DVD player may have a very high bandwidth, e.g. 29.4 Mb/sec. In order to maintain a high quality image on the display devices, the encoder ensures that the video images are encoded in a way that no segments in the sequence of images would be so large that cannot be delivered to the decoder input buffer on time.
VI. Computer System
From these various memory units, the processor 910 retrieves instructions to execute and data to process in order to execute the processes of the invention. The read-only-memory (ROM) 920 stores static data and instructions that are needed by the processor 910 and other modules of the computer system.
The permanent storage device 925, on the other hand, is read-and-write memory device. This device is a non-volatile memory unit that stores instruction and data even when the computer system 900 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 925.
Other embodiments use a removable storage device (such as a floppy disk or Zip® disk, and its corresponding disk drive) as the permanent storage device. Like the permanent storage device 925, the system memory 915 is a read-and-write memory device. However, unlike storage device 925, the system memory is a volatile read-and-write memory, such as a random access memory. The system memory stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention's processes are stored in the system memory 915, the permanent storage device 925, and/or the read-only memory 920.
The bus 905 also connects to the input and output devices 930 and 935. The input devices enable the user to communicate information and select commands to the computer system. The input devices 930 include alphanumeric keyboards and cursor-controllers. The output devices 935 display images generated by the computer system. The output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD).
Finally, as shown in
While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. For instance, instead of using H264 method of simulating the decoder input buffer other simulation methods may be used that consider the buffer size, arrival and removal times of images in the buffer, and decoding and display times of the images.
Several embodiments described above compute the mean removed SAD to obtain an indication of the image variance in a macroblock. Other embodiments, however, might identify the image variance differently. For example, some embodiments might predict an expected image value for the pixels of a macroblock. These embodiments then generate a macroblock SAD by subtracting this predicted value form the luminance value of the pixels of the macroblock, and summing the absolute value of the subtractions. In some embodiments, the predicted value is based on not only the values of the pixels in the macroblock but also the value of the pixels in one or more of the neighboring macroblocks.
Also, the embodiments described above use the derived spatial and temporal masking values directly. Other embodiments will apply a smoothing filtering on successive spatial masking values and/or to successive temporal masking values before using them in order to pick out the general trend of those values through the video images. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details.
This application is a continuation application of U.S. patent application Ser. No. 11/118,604, now issued as U.S. Pat. No. 8,005,139, entitled “ENCODING WITH VISUAL MASKING,” filed Apr. 28, 2005 now U.S. Pat. No. 8,005,139. U.S. patent application Ser. No. 11/118,604 claims benefit of U.S. Provisional Patent Application 60/583,418, filed on Jun. 27, 2004. This application also claims benefit of U.S. Provisional Patent Application 60/643,918, filed Jan. 09, 2005. U.S. patent application Ser. No. 11/118,604, now issued as U.S. Pat. No. 8,005,139, and U.S. Provisional applications 60/583,418 and 60/643,918 are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5333012 | Singhal et al. | Jul 1994 | A |
5337049 | Shimoda | Aug 1994 | A |
5416604 | Park | May 1995 | A |
5473384 | Jayant et al. | Dec 1995 | A |
5691770 | Keesman et al. | Nov 1997 | A |
5790695 | Suwa | Aug 1998 | A |
5801779 | Uz et al. | Sep 1998 | A |
5872598 | Legall et al. | Feb 1999 | A |
5929916 | Legall et al. | Jul 1999 | A |
6023296 | Lee et al. | Feb 2000 | A |
6049629 | Hirabayashi | Apr 2000 | A |
6101276 | Adiletta et al. | Aug 2000 | A |
6111991 | Ribas-Corbera et al. | Aug 2000 | A |
6148107 | Ducloux | Nov 2000 | A |
6192075 | Jeng | Feb 2001 | B1 |
6229925 | Alexandre et al. | May 2001 | B1 |
6278735 | Mohsenian | Aug 2001 | B1 |
6295375 | Andry | Sep 2001 | B1 |
6411738 | Fert et al. | Jun 2002 | B2 |
6414992 | Sriram et al. | Jul 2002 | B1 |
6490320 | Vetro et al. | Dec 2002 | B1 |
6493385 | Sekiguchi et al. | Dec 2002 | B1 |
6493386 | Vetro et al. | Dec 2002 | B1 |
6574279 | Vetro et al. | Jun 2003 | B1 |
6650707 | Youn et al. | Nov 2003 | B2 |
6760482 | Taubman | Jul 2004 | B1 |
6826228 | Hui | Nov 2004 | B1 |
6925119 | Bartolucci et al. | Aug 2005 | B2 |
7042943 | Haskell et al. | May 2006 | B2 |
7072397 | Sriram et al. | Jul 2006 | B2 |
7079581 | Noh et al. | Jul 2006 | B2 |
7095784 | Chang et al. | Aug 2006 | B2 |
7346106 | Jiang et al. | Mar 2008 | B1 |
7822118 | Haskell et al. | Oct 2010 | B2 |
8005139 | Wu et al. | Aug 2011 | B2 |
20010000704 | Fert et al. | May 2001 | A1 |
20010014121 | Kaye et al. | Aug 2001 | A1 |
20030202580 | Noh et al. | Oct 2003 | A1 |
20040096113 | Taima | May 2004 | A1 |
20050074061 | Ribas-Corbera et al. | Apr 2005 | A1 |
20050105815 | Zhang et al. | May 2005 | A1 |
20050169370 | Lee | Aug 2005 | A1 |
20060013298 | Tong et al. | Jan 2006 | A1 |
20060245492 | Pun et al. | Nov 2006 | A1 |
20100329333 | Haskell et al. | Dec 2010 | A1 |
20120250761 | Tong et al. | Oct 2012 | A1 |
Number | Date | Country |
---|---|---|
1176562 | Mar 1998 | CN |
0910212 | Apr 1999 | EP |
1563688 | Aug 2005 | EP |
1762093 | Mar 2007 | EP |
1933569 | Jun 2008 | EP |
2271104 | Jan 2011 | EP |
8-275176 | Oct 1996 | JP |
2001-501429 | Jan 2001 | JP |
2001-520854 | Oct 2001 | JP |
2002335527 | Nov 2002 | JP |
2003153259 | May 2003 | JP |
2004-166128 | Jun 2004 | JP |
10-0305941 | Oct 1999 | KR |
2001-53002 | Jun 2001 | KR |
2003-82818 | Oct 2003 | KR |
545066 | Aug 2003 | TW |
WO 9907158 | Feb 1999 | WO |
WO 9943163 | Aug 1999 | WO |
WO 9966734 | Dec 1999 | WO |
WO 0249364 | Jun 2002 | WO |
WO 02089489 | Nov 2002 | WO |
WO 2004045218 | May 2004 | WO |
WO 2005011255 | Feb 2005 | WO |
WO 2006004605 | Jan 2006 | WO |
Entry |
---|
U.S. Appl. No. 13/437,931, filed Apr. 3, 2012, Tong, Xin, et al. |
Updated portions of prosecution history of U.S. Appl. No. 12/795,650, filed Mar. 29, 2012, Haskell, Barin Geoffry, et al. |
Updated portions of prosecution history of U.S. Appl. No. 11/118,616, filed Mar. 16, 2012, Tong, Xin, et al. |
Updated portions of prosecution history of U.S. Appl. No. 11/118,618, filed Feb. 16, 2012, Pun, Thomas, et al. |
Updated portions of prosecution history of EP05773224, Apr. 18, 2012 Apple Inc. |
Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, “Working Draft No. 2, Revision 2 (WD-2),” Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, Jan. 29-Feb. 1, 2002, 106 pages, Geneva, Switzerland, JVT-B118r2. |
Portions of prosecution history of U.S. Appl. No. 10/615,117, filed Oct. 27, 2005, Haskell, Barin Geoffry, et al. |
Portions of prosecution history of U.S. Appl. No. 11/344,591, filed Jun. 24, 2010, Haskell, Barin Geoffry, et al. |
Portions of prosecution history of U.S. Appl. No. 12/795,650, filed Nov. 17, 2011, Haskell, Barin Geoffry, et al. |
Portions of prosecution history of U.S. Appl. No. 11/118,616, filed Oct. 14, 2011, Tong, Xin, et al. |
Portions of prosecution history of U.S. Appl. No. 11/118,604, filed Jul. 14, 2011, Wu, Hsi Jung, et al. |
Portions of prosecution history of U.S. Appl. No. 11/118,618, filed Oct. 25, 2011, Pun, Thomas, et al. |
International Search Report for PCT/US2003/034659, Mar. 12, 2004 (mailing date), Apple Computer, Inc. |
International Preliminary Examination Report for PCT/US2003/034659, Apr. 25, 2006 (completion date), Apple Computer, Inc. |
Written Opinion for PCT/US2003/034659, Sep. 13, 2005 (mailing date), Apple Computer, Inc. |
Portions of prosecution history of EP03778014, Dec. 2, 2010 (mailing date), Apple Inc. |
Portions of prosecution history of EP08005751, Sep. 23, 2011 (mailing date), Apple Inc. |
International Search Report and Written Opinion for PCT/US2005/022616, Mar. 20, 2006 (mailing date), Apple Computer, Inc. |
International Preliminary Report on Patentability for PCT/US2005/022616, Dec. 28, 2006 (issuance date), Apple Computer, Inc. |
Portions of prosecution history of EP05773224, May 31, 2011 (mailing date), Apple Inc. |
Aramvith, Supavadee, et al., “A Rate-Control Scheme for Video Transport over Wireless Channels,” IEEE Trans. on Circuits and Systems for Video Technology, May 2001, pp. 569-580, vol. 11, No. 5. |
Boroczky, Lila, et al., “Joint Rate-Control with Look-Ahead for Multi-Program Video Coding,” IEEE Trans. On Circuits and Systems for Video Technology, Oct. 2000, pp. 1159-1163, vol. 10, No. 7. |
Chiu, Yi-Jen, et al., “A Software-Only Videocodec Using Pixelwise Conditional Differential Replenishment and Perceptual Enhancements,” IEEE Trans. on Circuits and Systems for Video Technology, Apr. 1999, pp. 438-450, vol. 9, No. 3. |
Chou, Chun-Hsien, et al., “A Perceptually Tuned Subband Image Coder Based on the Measure of Just-Noticeable-Distortion Profile,” IEEE Trans. on Circuits and Systems for Video Technology, Dec. 1995, pp. 467-476, vol. 5, No. 6. |
De Vleeschouwer, Christophe, et al., “Algorithmic and Architectural Co-Design of a Motion-Estimation Engine for Low-Power Video Devices,” IEEE Trans. on Circuits and Systems for Video Technology, Dec. 2002, pp. 1093-1105, vol. 12, No. 12. |
Ding, Wei, “Joint Encoder and Channel Rate Control of VBR Video over ATM Networks,” IEEE Trans. on Circuits and Systems for Video Technology, Apr. 1997, pp. 266-278, vol. 7, No. 2. |
Ding, Wei, et al., “Rate Control of MPEG Video Coding and Recoding by Rate-Quantization Modeling,” IEEE Trans. on Circuits and Systems for Video Technology, Feb. 1996, pp. 12-20, vol. 6, No. 1. |
Dufaux, Frederic, et al., “Efficient, Robust and Fast Global Motion Estimation for Video Coding,” IEEE Trans. on Image Processing, Mar. 2000, pp. 497-501, vol. 9, No. 3. |
Dumitras, Adriana et. al., “Enhancement of Direct Mode Selection in B Pictures for Bit Rate Reduction of Compressed Video Sequences,” Proceedings of IEEE International Conference on Image Processing (ICIP), Sep. 14-17, 2003, pp. 825-828, vol. 3, IEEE, Barcelona, Spain. |
Dumitras, Adriana, et al., “I/P/B Frame Type Decision by Collinearity of Displacements,” Intl. Conference on Image Processing, 2004. pp. 2769-2772, IEEE. |
Fan, Kuo-Chin, et al., “An Active Scene Analysis-Based Approach for Pseudoconstant Bit-Rate Video Coding,” IEEE Trans. on Circuits and Systems for Video Technology, Apr. 1998, pp. 159-170, vol. 8, No. 2. |
Gu, Xiaodong, et al., “Implementing Dynamic GOP in Video Encoding,” in IEEE Intl. Conference on Multimedia and Expo (ICME), Baltimore, 2003, pp. 349-352, vol. 1. |
He, Zhihai, et al., “Low-Delay Rate Control for DCT Video Coding via p-Domain Source Modeling,” IEEE Trans. on Circuits and Systems for Video Technology, Aug. 2001, pp. 928-940, vol. 11, No. 8. |
He, Zhihai, et al., “Optimum Bit Allocation and Accurate Rate Control for Video Coding via p-Domain Source Modeling,” IEEE Trans. on Circuits and Systems for Video Technology, Oct. 2002, pp. 840-849, vol. 12, No. 10. |
Jagmohan, Ashish, et al., “MPEG-4 One-Pass VBR Rate Control for Digital Storage,” IEEE Trans. on Circuits and Systems for Video Technology, May 2003, pp. 447-452, vol. 13, No. 5. |
Jayant, Nikil, et al., “Signal Compression Based on Models of Human Perception,” Proceedings for IEEE, Oct. 1993, pp. 1385-1422, vol. 81, No. 10. |
Jozawa, Hirohisa, et al., “Two-Stage Motion Compensation Using Adaptive Global MC and Local Affine MC,” IEEE Trans. on Circuits and Systems for Video Technology, Feb. 1997, pp. 75-82, vol. 7, No. 1. |
Lan, Austin Y., et al., “Scene-Context-Dependent Reference-Frame Placement for MPEG Video Coding,” IEEE Trans. on Circuits and Systems for Video Technology, Apr. 1999, pp. 478-489, vol. 9, No. 3. |
Lee, Hung-Ju, et al., “Scalable Rate Control for MPEG-4 Video,” IEEE Trans. on Circuits and Systems for Video Technology, Sep. 2000, pp. 878-894, vol. 10, No. 6. |
Lee, Jeong-Woo, et al., “Bit Allocation for MPEG-4 Video Coding with Spatio-Temporal Tradeoffs,” IEEE Trans. on Circuits and Systems for Video Technology, Jun. 2003, pp. 488-502, vol. 13, No. 6. |
Lee, Jungwoo, et al., “Scene-Adaptive Motion Interpolation Structures Based on Temporal Masking in Human Visual Perception,” in Proc. SPIE Visual Comm. and Image Processing, 1993, pp. 499-510, vol. 2094. |
Lee, Jungwoo, et al., “Temporally Adaptive Motion Interpolation Exploiting Temporal Masking in Visual Perception,” IEEE Trans. on Image Processing, Sep. 1994, pp. 513-526, vol. 3, No. 5. |
Lee, Sanghoon ,et al., “Foveated Video Compression with Optimal Rate Control,” IEEE Trans. on Image Processing, Jul. 2001, pp. 977-992, vol. 10, No. 7. |
Ortega, Antonio, et al., “Optimal Trellis-Based Buffered Compression and Fast Approximations,” IEEE Trans. on Image Processing, Jan. 1994, pp. 26-40, vol. 3, no. 1. |
Ortega, Antonio, et al., “Rate-Distortion Methods for Image and Video Compression,” IEEE Signal Processing Magazine, Nov. 1998, pp. 23-50. |
Pan, Feng, et al., “A Study of MPEG-4 Rate Control Scheme and Its Improvements,” IEEE Trans. on Circuits and Systems for Video Technology, May 2003, pp. 440-446, vol. 13, No. 5. |
Pao, I-Ming, et al., “Encoding Stored Video for Streaming Applications,” IEEE Trans. on Circuits and Systems for Video Technology, Feb. 2001, pp. 199-209, vol. 11, No. 2. |
Pickering, Mark R., et al., “A Perceptually Efficient VBR Rate Control Algorithm,” IEEE Trans. on Image Processing, Sep. 1994, pp. 527-532, vol. 3, No. 5. |
Puri, Atul, et al., “Motion-Compensated Video Coding with Adaptive Perceptual Quantization,” IEEE Trans. on Circuits and Systems for Video Technology, Dec. 1991, pp. 351-361, vol. 1, No. 4. |
Ribas-Corbera, Jordi, et al., “Rate Control in DCT Video Coding for Low-Delay Communications,” IEEE Trans. on Circuits and Systems for Video Technology, Feb. 1999, pp. 172-185, vol. 9, No. 1. |
Ronda, Jose I., et al., “Rate Control and Bit Allocation for MPEG-4,” IEEE Trans. on Circuits and Systems for Video Technology, Dec. 1999, pp. 1243-1258, vol. 9, No. 8. |
Segall, C. Andrew, et. al., “Pre- and Post-Processing Algorithms for Compressed Video Enhancement,” Conference Record of the 34th Asilomar Conference on Signals, Systems, & Computers, Oct. 29-Nov. 1, 2000, pp. 1369-1373, vol. 2., Pacific Grove, California, USA. |
Seungjoon, Yang, et. al., “Blocking Effect Removal Using Regularization and Dithering,” 1998 International Conference on Image Processing, Oct. 4-7, 1998, pp. 415-419, Chicago, Illinois, US. |
Song, Hwangjun, et al., “Rate Control for Low-Bit-Rate Video via Variable-Encoding Frame Rates,” IEEE Trans. on Circuits and Systems for Video Technology, Apr. 2001, pp. 512-521, vol. 11, No. 4. |
Tai, Pol-Lin, et al., “Computation-Aware Scheme for Software-Based Block Motion Estimation,” IEEE Trans. on Circuits and Systems for Video Technology, Sep. 2003, pp. 901-913, vol. 13, No. 9. |
Tan, K.T., et al., “A Multi-Metric Objective Picture-Quality Measurement Model for MPEG Video,” IEEE Trans. on Circuits and Systems for Video Technology, Oct. 2000, pp. 1208-1213, vol. 10, No. 7. |
Tan, Soon Hie, et al., “Classified Perceptual Coding with Adaptive Quantization,” IEEE Trans. on Circuits and Systems for Video Technology, Aug. 1996, pp. 375-388, vol. 6, No. 4. |
Vetro, Anthony, et al., “MPEG-4 Rate Control for Multiple Object Coding,” IEEE Trans. on Circuits and Systems for Video Technology, Feb. 1999, pp. 186-199, vol. 9, No. 1. |
Wang, Limin, “Bit Rate Control for Hybrid DPCM/DCT Video Codec,” IEEE Trans. on Circuits and Systems for Video Technology, Oct. 1994, pp. 504-517, vol. 4, No. 5. |
Wang, Limin, et al., “Bit Allocation and Constraints for Joint Coding of Multiple Video Programs,” IEEE Trans. on Circuits and Systems for Video Technology, Sep. 1999, pp. 949-959 , vol. 9, No. 6. |
Yang, Yan, et al., “Rate Control for VBR Video Over ATM: Simplification and Implementation,” IEEE Trans. on Circuits and Systems for Video Technology, Sep. 2001, pp. 1045-1058, vol. 11, No. 9. |
Yang, Yan, et al., “Rate-Distortion Optimizations for Region and Object Based Wavelet Video Coding,” Conference Record of the 34th Asilomar Conference on Signals, Systems & Computers, Oct. 29, 2000, pp. 1363-1368, vol. 2, Pacific Grove, California, USA. |
Yu, Yue, et al., “A Novel Two-Pass VBR Coding Algorithm for Fixed-Size Storage Application,” IEEE Trans. on Circuits and Systems for Video Technology, Mar. 2001, pp. 345-356, vol. 11, No. 3. |
Updated portions of prosecution history of U.S. Appl. No. 11/118,616, filed Aug. 22, 2012, Tong, Xin, et al. |
Updated portions of prosecution history of U.S. Appl. No. 13/437,931, filed Feb. 1, 2013, Tong, Xin, et al. |
Number | Date | Country | |
---|---|---|---|
20120008695 A1 | Jan 2012 | US |
Number | Date | Country | |
---|---|---|---|
60583418 | Jun 2004 | US | |
60643918 | Jan 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11118604 | Apr 2005 | US |
Child | 13179476 | US |