Next Article in Journal
Markup in Engineering Design: A Discourse
Next Article in Special Issue
QoS Provisioning Techniques for Future Fiber-Wireless (FiWi) Access Networks
Previous Article in Journal
Theoretical Foundations of the Web: Cognition, Communication, and Co-Operation. Towards an Understanding of Web 1.0, 2.0, 3.0
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic QoS Evaluation of Multimedia Contents in Wireless Networks by “Double-Boomerang” Watermarking

Digital Signal Processing, Multimedia, and Optical Communications Laboratory, Department of Applied Electronics, University of ROMA TRE, via della Vasca Navale 84, 00146 Rome, Italy
*
Author to whom correspondence should be addressed.
Future Internet 2010, 2(1), 60-73; https://doi.org/10.3390/fi2010060
Submission received: 4 January 2010 / Revised: 2 February 2010 / Accepted: 2 March 2010 / Published: 8 March 2010
(This article belongs to the Special Issue QoS in Wired and Wireless IP Networks)

Abstract

:
This work presents a cooperative network-aware processing of multimedia content for dynamic quality of service management in wireless IP networks. Our technique can be also used for quality control in UMTS environments, exploiting the tracing watermarking recently introduced in literature. In this work, we use the transmitted video-sequences to monitor the QoS in a videoconference call. The video-sequence of every active user travels on the communication link, one time as video (transparent mode), one time as watermark (hidden mode) describing a boomerang trajectory. The results obtained through our simulation trials confirm the validity of such approach. In fact, the advantages of distributing the management process are (i) an easier and more precise localization of the cause of QoS problems, (ii) a better knowledge of local situations, (iii) a lower complexity for a single QoS agent and (iv) an increase in possible actions.

1. Introduction

Progress in Telecommunications and Networking is fostering the development of high-speed and ubiquitous networks, both wired and wireless (i.e. heterogeneous configurations), characterized by an unprecedented degree of transport capacity and flexibility. Open-service framework concepts will enable the provisioning of a wide spectrum of services merging voice and data features. It offers potential benefits to shareholders by enabling application services to make better use of network functions (and thereby retain more of the services’ value-add within the network). The lack of access and location transparency as well as of re-configurability and adaptability capabilities has proven to be a major shortcoming for the evolution towards a universal 4G mobile wireless network [1]. Therefore, the future trend is going to provide the transmission rates required by most potential users, but the practical question arises of what type of services can be provided, as well as when and where [2]. Moreover, streaming of multimedia content to different receivers across heterogeneous networks is a challenge in the current Internet [3]. There exists a clear trend for the convergence of IP protocol to wireless, that is, what we now call wireless IP, leading to the Wireless Internet [4].
Addressing some of these issues, this paper proposes a cooperative processing of multimedia content (namely, double boomerang approach) for dynamic QoS management, exploiting the tracing watermarking technique recently introduced in [5]. More specifically, we employed the transmitted video-sequences to monitor the QoS in a videoconference call: the video-sequence of every active user travels on the communication link one time as video (transparent mode), one time as watermark (hidden mode). Therefore, every video-sequence of each user involved in the communication describes a boomerang trajectory. Moreover, real-time video transmission is very sensitive to burst errors caused by the time varying signal strength received from the wireless channels. Even one bit error might cause severe degradation in video quality. Therefore, it is obligatory for the video encoder to protect the video data from the channel errors by using error control techniques such as forward error correction (FEC) and the automatic repeat request (ARQ). Our watermarking technique can also be used for quality control (such as in the outer loop power control in UMTS environment) and to implement error control approaches, e.g. FEC or the ARQ with piggybacking or the Hybrid ARQ, such as in classical UMTS applications. In such a way, the advantages of distributing the management process allow: (i) an easier and more precise localization of the cause of QoS problems, (ii) a better knowledge of local situations, (iii) a lower complexity for a single QoS agent (i.e. the user equipment) and (iv) an increase in possible actions. Moreover, the basic idea of using a two-way spread spectrum communication (called double boomerang transmission system) was exploited in [6] for the purpose of sharing data and positioning information in vehicular networks. The remainder of this paper is organized as follows. Section 2 is about the state of the art of the QoS techniques used in wireless networks. In the first half of Section 3, the principles of the tracing watermarking approach are briefly summarized, while the cooperative QoS assessment, obtained exploiting the tracing watermarking technique, is detailed in the second half of the Section. Our numerical results and comparisons are outlined in Section 4, and finally, our conclusions are depicted in Section 5. A future work Section is developed in Section 6.

2. State of the art

The design of distributed multimedia applications, such as systems for access to remote multimedia databases or teleconferencing, requires careful consideration of quality of service (QoS), because the presentation quality of live media, especially video, requires relatively high utilization of networking bandwidth and processing power in the receiving systems. For applications running in a shared environment, the allocation and management of these resources is an important question, although most existing systems are based on a best-effort approach [7]. Due to their real-time characteristics, multimedia sessions need quality guarantees from the network [3]. A major quality of service (QoS) requirement for real-time media is to deliver packets reliably to the end receiver(s) and in a timely fashion. The estimation of the current quality is necessary to determine the operating settings for acceptable error probability and signal-to-interference ratio (SIR) target level [8]. In UMTS environments, this quality control is implemented by means of inner and outer loop power control. In particular, our technique aims to infer with this latter mechanism of quality measure (i.e. the outer loop power control).
Traditionally, one of three techniques has been used for error-control: automatic repeat request (ARQ, and Hybrid ARQ in UMTS applications) which uses acknowledgments, time-outs, and retransmissions; forward error correction (FEC); and error concealment (EC) at the receiver [9]-[11]. In addition, for a teleconferencing application involving many users, a single quality of service level may not be appropriate for all participating users, since some users may participate with a very limited local workstation which cannot provide for the quality which is adopted by the majority of the conference participants [5]. Consequently, multimedia content processing has employed new paradigms that include distributed, cooperative, and resource-constrained models, whereas multimedia communications have addressed the new application challenges by focusing on cross-layer design [12]-[13]. With few exceptions, such as joint source channel coding and adaptive streaming, processing of multimedia content has been approached as a network-independent problem by the research and academic communities [14]-[15]. In turn, the works that addressed the content delivery aspects have typically not included the characteristics of the source content and have primarily studied interactions among lower layers of the protocol stack [16]. However, the processing and delivery of multimedia content are not independent and their interaction has a major impact on the QoS aspects. QoS is designed to hide low-level application variation and provide necessary service guarantees [2]. In particular, tracing watermarking (already thought for Copyright Protection purposes) has been recently proposed as a technique to provide a blind measure of the QoS of the communication link by means of an unconventional use of digital watermarking [5].

3. Double Boomerang Watermarking

In this Section, the principles of the tracing watermarking procedure and the metrics employed for the QoS assessment are introduced. Although copyright protection was the very first application of watermarking, different uses have been recently proposed in the literature. Fingerprinting, broadcast monitoring, data authentication, multimedia indexing, content-based retrieval applications [17]-[19], are only a few of the new applications where watermarking can be usefully employed. When these techniques are used to preserve the copyright ownership with the purpose of avoiding unauthorized data duplications, the embedded watermark should be detectable. Usually, these techniques use a robust watermarking which means that the embedded watermark is supposed to be detectable (i.e. the watermark used for copyright protection should not allow the use of the watermarked content until it has not been correctly extracted). Indeed, there are a number of desirable characteristics that a watermark should exhibit [20]. It at least should comply with the following two basic requirements for image watermark: first, the digital watermark should not be noticeable to the viewer (i.e. transparency of digital watermark). Second, the digital watermark is still present in the image after distortion and can be detected by the watermark detector (i.e. robustness of digital watermark to image processing). The key to the watermarking technique is to compromise between the two aforementioned requirements. Recently, an unconventional use of fragile watermarking has been proposed to blindly estimate the quality of service of a communication link [5], and for QoS provisioning and control purposes [2]. The rationale behind the approach is that the alterations suffered by the watermark are likely to be suffered by the data, since they follow the same communication link. Therefore, the watermark degradation can be used to evaluate the alterations endured by the data, obtaining a QoS index of the communication link (as explained in principles in Fig. 1).
Figure 1. Idea of tracing watermarking: the watermark degradations can be used to trace the alterations endured by the data.
Figure 1. Idea of tracing watermarking: the watermark degradations can be used to trace the alterations endured by the data.
Futureinternet 02 00060 g001
At the receiving side the watermark is extracted and compared with its original counterpart. Spatial spread-spectrum techniques perform the watermarking embedding. In practices, the watermark (narrow band low energy signal) is spread over the image (larger bandwidth signal) so that the watermark energy contribution for each host frequency bins is negligible, which makes the watermark near imperceptible. Following the same methodological approach of [5] and referring to the block scheme of Fig. 2, a set of uncorrelated pseudo-random noise (PN) matrices (one per each frame and known to the receiver) is multiplied by the reference watermark (one for all the transmission session and known to the receiver): w i ( s ) [ k 1 , k 2 ] = w [ k 1 , k 2 ] p i [ k 1 , k 2 ] , where w [ k 1 , k 2 ] is the original watermark, p i [ k 1 , k 2 ] the PN matrices and w i (s) [ k 1 , k 2 ] the spread version of the watermark to be embedded in the i-th frame. The embedding is performed in the DCT (discrete cosine transform) domain according to the following:
F i ( w ) [ k 1 , k 2 ] = { F [ k 1 , k 2 ] + β w i ( s ) [ k 1 , k 2 ] ,    ( k 1 , k 2 ) Φ F [ k 1 , k 2 ] ,      otherwise
where Fi[k1, k2] = DCT{fi[k1, k2]} is the DCT transform of the i-th frame; Φ is the region of middle-high frequencies of the image in the DCT domain, while β determines the watermark strength and Fi(w)[k1, k2] is the DCT of the i-th watermarked frame. By increasing the value of β, the mark becomes more evident and a visual degradation of the image (or video) occurs. On the contrary, by diminishing its value, the mark can be easily removed by the coder and/or channel’s errors. Therefore, in the application scenario of our simulation trials, the scaling factor β has been chosen in such a way to compromise between the two aforementioned requirements. The i-th watermarked frame is then obtained by performing the IDCT (inverse DCT) of Fi(w)[k1, k2], finally the whole sequence is MPEG-coded and then transmitted through a noisy channel.
The receiver implements video decoding as well as watermark detection. In fact, at the same time after decoding of the video-stream, a matched filter extracts the (known) watermark from the DCT of each n-th received I-frame of the sequence. The estimated watermark is matched to the reference one (despread with the known PN matrix). The matched filter is tuned to the particular embedding procedure, so that it can be matched to the randomly spread watermark only. It is assumed that the receiver knows the initial spatial application point of the mark in the DCT domain. The QoS is evaluated by comparing the extracted watermark with respect to the original one. In particular, its mean-square-error (MSE) is evaluated as an index of the effective degradation of the provided QoS. A possible index of the degradation is simply obtained by calculating the mean of the error energy:
M S E = 1 M n = 1 M ( k 1 = 1 K 1 k 2 = 1 K 2 ( w n [ k 1 , k 2 ] w n [ k 1 , k 2 ] ) 2 )
where w n [ k 1 , k 2 ] and w ^ n [ k 1 , k 2 ] , represent the original and the extract watermark respectively, and n = 1, ..., M is the current frame index.
It is worth noting that the metric (2), which is evaluated using the estimated watermarks over the M transmitted frames, is employed to provide a quality assessment of the received video after the MPEG coding/transmission process. In particular, such a QoS index can be usefully employed for a number of different purposes in mobile multimedia communications such as: control feedback to the sending user on the effective quality of the link; detailed information to the operator for billing purposes and diagnostic information to the operator about the communication link status.
Although sophisticated video quality perceptual metrics could be used for quality assessment purposes in multimedia communications (see, for instance, [21]), the MSE between the estimated watermark and the original one is used in this contribution as a proof of concept of the objective cooperative method proposed here, and shown by extensive simulation trials in Section 4.
Figure 2. Principle scheme of the double boomerang approach for QoS purposes.
Figure 2. Principle scheme of the double boomerang approach for QoS purposes.
Futureinternet 02 00060 g002

4. Simulation Results and Discussion

In this Section, some experimental results characterizing the effectiveness of the proposed method are presented. The dimensions of the video-sequences employed in our experimentations have been properly chosen in order to simulate a multimedia service in a UMTS scenario, i.e. typical 3G video-calls. Therefore, QCIF (144x176) video sequences, which well match the limited dimensions of a mobile terminal’s display, have been employed and a frame rate of 15 fps has been chosen. The marked video is then transmitted over noisy channels, simulated by Poisson’s generators of random transmission errors. Specifically, wireless channels characterized by different levels of bit error rate (BER) have been designed, considering the customers near and/or far from the base station (BS), respectively. Specifically, we take into account the near-far-effect typical of cellular systems: when the user is near the BS, the uplink communication has been considered worse than the downlink path, in terms of BER while, when the user is far from the BS, the uplink path has been considered better than the downlink (i.e. the mobile transmits with much more power to compensate the distance from the BS). For users closer to the BS, we have imposed an uplink BER of 10-4 and a downlink BER of 10-5, while for users far from the BS, the uplink BER has been considered equal to 10-4 and the downlink BER to 10-3. Our simulation trials are proposed to test the effectiveness of the double boomerang approach, which can be used for error control purposes in e.g. Hybrid ARQ techniques in UMTS applications. Four situations are simulated: -two mobile agents far from the BS (scenario 1); -two mobile agents near to the BS (scenario 2); -the first mobile agent is near while the second is far from the BS (scenario 3), -the first mobile agent is far from the BS while the second is near (scenario 4).
Figure 3. Watermark MSE versus the different scenarios in the case of the video-communication between: (a) Suzie and Miss America; (b) Carphone and Foreman.
Figure 3. Watermark MSE versus the different scenarios in the case of the video-communication between: (a) Suzie and Miss America; (b) Carphone and Foreman.
Futureinternet 02 00060 g003
In all the following simulations, we have used the common test video-sequences such as Carphone, Foreman, Miss America and Suzie, all MPEG-4 coded. In particular, we have supposed two scenarios: a video-call between the users Carphone and Foreman and another video-call between MissAmerica and Suzie. We have first verified that with this double boomerang approach is still possible to trace the alterations endured by the data in the communication link. Then, we have evaluated an empirical relationship (obtained with the videos under investigation) between the MSE of the watermark and of the multimedia content transmitted trough the network, as a proof of concept of the objective QoS assessment method proposed here. Hence, we have used four different video-sequences and, in particular, each MSE value of our simulation trials is obtained after 106 Montecarlo runs. Moreover, we have evaluated the confidence level of our simulations, verifying that the confidence interval varies from the ±3% up to the ±10% corresponding to the different operating scenario under investigation. In particular, we have verified that the confidence interval varies (as expected) with the BER of the channel and hence is strictly connected to the link quality of the considered scenario: in fact, the confidence level becomes relevant when considering the worst channel conditions (i.e. scenarios 3 and 4) and it is in such conditions that the minimum MSE of the watermark may not correspond to the minimum MSE of the video (as it will be shown in the following graphs).
Figure 3(a) shows here the watermark MSE of the video-communication between MissAmerica-Suzie, while Figure 3(b) depicts the watermark MSE of the Carphone-Foreman video-communication. The MSE metric is evaluated using (2), comparing the received watermark (embedded using the double-boomerang approach explained in Section 3) and its original counterpart, i.e. the original frame opportunely adapted (i.e. cropped and binarized). It has to be noted that the MSE behavior is a direct consequence of the QoS of the network. In fact, the communication link is supposed to have the best quality in the first case (i.e. scenario 1), worst quality in the second case (i.e. scenario 2) and intermediate quality otherwise (i.e. scenarios 3 and 4). In other words, the degradations suffered by the watermark during the communication are proportional to the QoS (i.e. the BER) of the link: in fact, it can be easily seen from Figure 3 that the watermark is highly corrupted in the second scenario (corresponding to the worst BER), while it is slightly damaged in the first scenario (corresponding to the best BER). In the third and fourth scenarios, the MSE is at an intermediate level because the BER of the channel has an intermediate value between the first and second scenario.
Figure 4. MSE (normalized to 1) versus the different scenarios of the double boomerang watermark in the case of: (a) Miss America (b) Suzie (c) Carphone (d) Foreman video-sequences.
Figure 4. MSE (normalized to 1) versus the different scenarios of the double boomerang watermark in the case of: (a) Miss America (b) Suzie (c) Carphone (d) Foreman video-sequences.
Futureinternet 02 00060 g004
In order to characterize the performance of the proposed method to provide a quality measure of the transmission process of the multimedia content through the network, Figure 4 shows here the MSE of both the received video and the watermark, in respect to the four different operating scenarios (i.e. versus different BER of the transmission channel): in fact in our simulation trials, the communication link (i.e. the channel BER) is supposed to have the best quality in the first case (i.e. scenario 1), worst quality in the second case (i.e. scenario 2) and intermediate quality otherwise (i.e. scenarios 3 and 4). Once again, it can be easily seen from the figure that the watermark is highly corrupted in the second scenario (corresponding to the worst BER), while it is slightly damaged in the first scenario (corresponding to the best BER). In the third and fourth scenarios, the MSE is at an intermediate level because the BER of the channel has an intermediate value between the first and second scenario. It is not surprising that there are cases, shown in Fig. 4, where the minimum mean square error of the watermark does not closely follow the minimum mean square error of the video trace per se. This is a consequence of the particular scenario (i.e. the BER of the channel) under investigation. In fact, this situation happens only in the case of scenario 3 and 4 that are characterized by an intermediate quality level between the other scenarios: since the transmission errors introduced by the channel are modeled as a random Poisson process, characterized by a parametric probability of symbol error (i.e. proportional to the BER), operating in the scenarios 3 and 4 means to have two different quality levels for both the downlink and uplink channel. Moreover, it has to be underlined that these two scenarios are characterized by a confidence level that is greater than the one of the other two scenarios. The consequence is that the watermark degradations closely follow the ones of the video (constrained between the higher and lower performance bounds) but the minimum of the video MSE may not more correspond to the minimum of the watermark MSE, since the quality of the (uplink and downlink) channels can be different. Moreover, we can say that the first and the second scenarios represent the (upper and lower) bounds of the system performances, characterized by the same channel quality for both the uplink and downlink trajectory. It has to be underlined, as said before, that these two scenarios are characterized by a confidence level that is lower than the one of the other two scenarios. The consequence is that the watermark degradations closely follow the ones of the video, since they are transmitted over the same (uplink and downlink) noisy channels and hence, the minimum mean square error of the watermarking corresponds to the minimum mean square error of the video trace per se.
To fully understand the relation between the multimedia content and the watermark, we compare the MSE of the watermark with the MSE of the video after the double boomerang trajectory. It has to be remembered that the video-sequence of every active user travels on the communication link one time as video (transparent mode), one time as watermark (hidden mode). Hence, the watermark suffers twice the degradations of the communication link, due to the boomerang path. It is worth noting that the MSE of the video-sequences increases when the BER increases: this is in accordance with the degradation that the videos suffer at increasing BER. In addition, the quality degradation of the extracted watermark embedded into the host video has the same behaviour of the one affecting the video itself, as shown in terms of MSE in Figure 4. Comparing these experimental results, it is now possible to evaluate an empirical relationship between the MSE of the boomerang watermark and the one of the host multimedia content, as shown in Figure 5. In particular, the values of the curve have been selected considering only the cases of Fig. 4 where the watermark degradations closely follow the ones of the video. Hence, the values in Fig. 5 have been obtained exploiting the values of the four videos under investigation only in the first and second scenarios, i.e. considering the (asymptotic)performance of the system in the best and worst case, respectively.
Figure 5. Relationship between watermark and video degradation in terms of MSE for the analyzed cases and scenarios under investigation.
Figure 5. Relationship between watermark and video degradation in terms of MSE for the analyzed cases and scenarios under investigation.
Futureinternet 02 00060 g005
As it can be easily seen in Fig. 5, the graph shows only very large values of the MSE of the watermark and this is a consequence of the operating scenarios used in our research. In fact, considering the quality of the communication channel used in all the four scenarios, we can evaluate the relationship between the watermark MSE and the channel BER. This relationship is represented in Fig. 6, where it is clearly visible that for the minimum BER of 10-4, the watermark MSE is characterized by a large value (equal to 0.74) while for the worst BER of more than 10-3 the watermark MSE assumes a value that is even larger than before (almost equal to 1). Hence, these are the values of great interest for the mark MSE used in this work. Moreover, here we are interested in evaluating an objective relationship between the mark and the video (i.e. we are using only the MSE as a quality metric) and, considered that the watermark is a narrow band low energy signal, large values of the watermark MSE are needed to appreciate alterations of the video objective quality. Future researches will be devoted to analyze subjective indicators of the video quality investigating how lower values of the watermark MSE reflect in video alterations.
Figure 6. Relationship between the channel BER and the watermark MSE for the analyzed cases and scenarios under investigation.
Figure 6. Relationship between the channel BER and the watermark MSE for the analyzed cases and scenarios under investigation.
Futureinternet 02 00060 g006
It has to be underlined that if some other videos (i.e., cases or scenarios) would be used, the curves in Fig. 5 and Fig. 6 would be characterized by a different behavior. Nonetheless, even if sophisticated quality metrics or cumbersome relationships could be used for quality assessment purposes in multimedia communications, the MSE between the estimated watermark and the original one is used in this contribution as a proof of concept of the objective method proposed here. This means that it would be always possible to trace the alterations endured by the data, tracing the alterations of the embedded mark, with a relationship that depends on the transmitted videos and scenarios under investigation.
Let us now focus on the computational complexity of the proposed technique, by analyzing the number of operations performed by the MS for the QoS assessment. According to Fig. 2, the floating point operations (flops) to be implemented by the MS processor are: first, the computation of the k1-by-k2 DCT of each frame; second, the correlation with the spread version of the watermark made of ¼k1k2 pixels (i.e. the original watermark pre-multiplied by one known PN matrix, different frame by frame); third, the accumulation of the detected mark averaged over M frames; last, the final evaluation of the MSE of the detected mark at the end of the procedure. The whole computation can be implemented either by sequential or parallel processing, depending on the available hardware. The approximate computing time needed by the QoS assessment procedure (from M frames of k1 by k2 pixels) operating either on sequential or parallel processors on a mobile device is depicted in Table. 1, in terms of the time required by the number of flops. For sake of compactness, we have reported only the number of real products and sums, assuming that:
– in sequential implementation, the time of one complex product is the same as four real products and two real sums, whereas the time of one complex sum time is equivalent to two real sums;
– in parallel implementation, the time of one complex product is the same as one real product and one real sum, whereas the time of one complex sum time is equivalent to one real sum.
Table 1. Approximate number of the flops-time required for the QoS detection on a mobile device.
Table 1. Approximate number of the flops-time required for the QoS detection on a mobile device.
Futureinternet 02 00060 i001
It has to be noted that in all the aforementioned cases, the DCT computation is the most time-consuming step: 98.8% of operations for sequential implementation and 92.2% for parallel implementation are required for the only DCT processing over the whole computation time. The tremendous advantage of parallel computing is motivated by the fact that DCT computation is implemented by fast Fourier transform (FFT). In fact, the computational complexity of FFT (over N data) is of the order of N log2 N, whereas it reduces to the order of log2 N by parallel processing schemes. It is opinion of the authors that the implementation of the proposed technique is going to be feasible on a mobile device as the MS, in a short time, will host large processing capabilities (including hardware DCT co-processors) because of the monotonically decreasing cost of very large-scale integration as well as the ever increasing running speed. Therefore the complexity of the QoS evaluation procedure, which is presented in this paper, appears negligible in comparison with real-time MPEG decoding and adaptive on-board array processing.
The obtained results prove the sensitivity of the watermarking quality index to the actual quality for given target quality levels and show the capability of this network-aware processing of multimedia content to trace the alterations suffered by the data through the network. Hence, the advantages of distributing the management process can be summarized in: (i) an easier and more precise localization of the cause of QoS problems, (ii) better knowledge of local situations, (iii) a lower complexity for a single QoS agent and (iv) an increase in possible actions.

5. Conclusions

This paper has introduced a “double-boomerang” watermarking technique for dynamic QoS and error control management of multimedia content in wireless IP networks. We employed the transmitted video-sequences to monitor the QoS in a videoconference call. Every video-sequence of each user involved in the communication describes a boomerang trajectory and the QoS management process is equally distributed between the network’s nodes. Our technique can be also used for quality control in UMTS environments, in particular it aims to infer with the outer loop power control for quality measure. The performance of the proposed method has been analyzed by wide simulation trials, focusing on multimedia communications environments, with typical UMTS operative settings taking into account the near-far effect. The obtained outcomes evidence the sensitivity of the proposed method and show the capability of this network-aware processing of multimedia content to react to the alterations suffered by the data through the communication channel.

6. Future work

Future researches will be devoted to investigate the impact of such a QoS index that can be sent back to the network manager in order to adopt optimal policies in terms of QoS adjustment to the subscriber’s duplex link. In a wireless cellular system such as the UMTS environment, the QoS index could bring the UMTS network operator to force a (likely soft or softer) handover process, in the cases when the power control fails. The QoS index could act as a supplementary warning when the power control is unable to request a handover for that subscriber. In practice, the mobile’s quality index may be fed back to the network manager to eventually force the handover process if the power control has been ineffective.

References

  1. Bader, F.; Pinart, C.; Christophi, C.; Tsiakkouri, E.; Ganchev, I.; Friderikos, V.; Bohoris, C.; Correia, L.; Ferreira, L. User-Centric Analysis of Perceived QoS in 4G IP Mobile/Wireless Networks. In Proceedings of the 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Beijing, China, September 2003; pp. 2047–2053.
  2. Giunta, G. Quality of service assessment in new generation wireless video communications. In Digital Image Sequence Processing, Compression, and Analysis; Reed, T. R., Ed.; CRC Press: Florida, USA, 2004; chapter 5; pp. 135–150. [Google Scholar]
  3. Mendes, P.; Schulzrinne, H.; Monteiro, E. Session-aware popularity-based resource allocation for assured differentiated services. IEEE Communications Magazine 2002, 40, 104–111. [Google Scholar] [CrossRef]
  4. Castro, J.P. The UMTS Network and Radio Access Technology: Air Interface Techniques for Future Mobile Systems; John Wiley & Sons: West Sussex, England, 2001. [Google Scholar]
  5. Campisi, P.; Carli, M.; Giunta, G.; Neri, A. Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking. IEEE Trans. on Sig. Proc. 2003, 51, 996–1002. [Google Scholar] [CrossRef]
  6. Mizui, K.; Uchida, M.; Nakagawa, M. Vehicle-to-vehicle 2-way communication and ranging system using spread spectrum technique: proposal of double boomerang transmission system. In Proceedings of IEEE Conference on Vehicle Navigation and Information Systems, Yokohama, Japan, August 1994; pp. 153–158.
  7. Fischer, S.; Hafid, A.; Bochmann, G.; De Meer, H. Cooperative QoS management for multimedia applications. In Proceedings of IEEE International Conference on Multimedia Computing and Systems, Ottawa, Ontario, Canada, June 1997; pp. 303–310.
  8. Avidor, D.; Hartmann, C.; Mukherjee, S. On the uplink SIR of a mobile in soft handoff with applications to BLER estimation. IEEE Trans. on Wireless Commun. 2005, 4, 467–474. [Google Scholar] [CrossRef]
  9. Nelson da Fonseca, L.S.; Rubinsztejn, H.K.S. Dimensioning the Capacity of True Video-on-Demand Servers. IEEE Trans. on Multimedia 2005, 7, 932–941. [Google Scholar] [CrossRef]
  10. Sun, Y.; Ahmad, I.; Li, D.; Zhang, Y.-Q. Region-Based Rate Control and Bit Allocation for Wireless Video Transmission. IEEE Trans. on Multimedia 2006, 8, 1–10. [Google Scholar] [CrossRef]
  11. Steinbach, E.; Farber, N.; Girod, B. Standard Compatible Extension of H.263 for Robust Video Transmission in Mobile Environments. IEEE Trans. on Circuits and Systems for Video Techn. 1997, 7, 872–881. [Google Scholar] [CrossRef]
  12. Qingwen, L.; Xin, W.; Giannakis, G.B. A cross-layer scheduling algorithm with QoS support in wireless networks. IEEE Trans. on Vehicular Technology 2006, 55, 839–847. [Google Scholar] [CrossRef]
  13. Xi, Z.; Jia, T.; Hsiao-Hwa, C.; Song, C.; Guizani, M. Cross-layer-based modeling for quality of service guarantees in mobile wireless networks. IEEE Commun. Mag. 2006, 44, 100–106. [Google Scholar]
  14. Zeng, W.; Lan, J.; Zhuang, X. Security for multimedia adaptation: architectures and solutions. IEEE Multimedia 2006, 13, 68–76. [Google Scholar] [CrossRef]
  15. Petridis, K.; Bloehdorn, S.; Saathoff, C.; Simou, N.; Dasiopoulou, S.; Tzouvaras, V.; Handschuh, S.; Avrithis, Y.; Kompatsiaris, Y.; Staab, S. Knowledge representation and semantic annotation of multimedia content. IEEE Proc. Vision, Image and Signal Proc. 2006, 153, 255–262. [Google Scholar] [CrossRef]
  16. Ahmed, T.; Mehaoua, A.; Boutaba, R.; Iraqi, Y. Adaptive packet video streaming over IP networks: a cross-layer approach. IEEE J. on Selected Areas in Commun. 2005, 23, 385–401. [Google Scholar] [CrossRef]
  17. Zaidi, A.; Vandendorpe, L. Coding Schemes for Relay-Assisted Information Embedding. IEEE Trans. on Information Forensics and Security 2009, 4, 70–85. [Google Scholar] [CrossRef]
  18. Yu, P.; Yao, S.; Xu, J.; Zhang, Y.; Chang, Y. Copyright Protection for Digital Image in Wireless Sensor Network. In Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom '09), Beijing, China, September 2009; pp. 1–4.
  19. Wang, J.; Liu, J. Video Authentication against Correlation Analysis Attack in Wireless Network. In Proceedings of the 10th IEEE International Symposium on Multimedia (ISM2008), Berkeley, California, USA, December 2008; pp. 396–403.
  20. Kleider, J.E.; Gifford, S.; Chuprun, S.; Fette, B. Radio frequency watermarking for OFDM wireless networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), Montreal, Quebec, Canada, May 2004; pp. 397–400.
  21. Winkler, S. Visual fidelity and perceived quality: Toward comprehensive metrics. Proceedings SPIE 2001, 4299, 114–125. [Google Scholar]

Share and Cite

MDPI and ACS Style

Benedetto, F.; Curcio, A.; Giunta, G. Dynamic QoS Evaluation of Multimedia Contents in Wireless Networks by “Double-Boomerang” Watermarking. Future Internet 2010, 2, 60-73. https://doi.org/10.3390/fi2010060

AMA Style

Benedetto F, Curcio A, Giunta G. Dynamic QoS Evaluation of Multimedia Contents in Wireless Networks by “Double-Boomerang” Watermarking. Future Internet. 2010; 2(1):60-73. https://doi.org/10.3390/fi2010060

Chicago/Turabian Style

Benedetto, Francesco, Alberto Curcio, and Gaetano Giunta. 2010. "Dynamic QoS Evaluation of Multimedia Contents in Wireless Networks by “Double-Boomerang” Watermarking" Future Internet 2, no. 1: 60-73. https://doi.org/10.3390/fi2010060

Article Metrics

Back to TopTop